#12209: Fix CVE-2019-11068 in libxslt (Security Framework Bypass)
-------------------------+------------------------
 Reporter:  renodr       |       Owner:  blfs-book
     Type:  enhancement  |      Status:  new
 Priority:  high         |   Milestone:  9.0
Component:  BOOK         |     Version:  SVN
 Severity:  normal       |  Resolution:
 Keywords:               |
-------------------------+------------------------
Description changed by bdubbs:

Old description:

> I noticed a Debian Security Update for this on one of my debian machines,
> and thought it was worth a look into. After finding it, I came across
> this:
>
> [https://nvd.nist.gov/vuln/detail/CVE-2019-11068]
>
> {{{
> libxslt through 1.1.33 allows bypass of a protection mechanism because
> callers of xsltCheckRead and xsltCheckWrite permit access even upon
> receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL
> that is not actually invalid and is subsequently loaded.
> }}}
>
> We need to apply the following commit:
>
> [https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6]
>
> Although the rest of the commits in the libxslt repo from the release of
> libxslt-1.1.33 onwards seem to be security related, so we might just want
> to create a consolidated patch. Mostly integer overflows it looks like.

New description:

 I noticed a Debian Security Update for this on one of my debian machines,
 and thought it was worth a look into. After finding it, I came across
 this:

 [https://nvd.nist.gov/vuln/detail/CVE-2019-11068]

 {{{
 libxslt through 1.1.33 allows bypass of a protection mechanism because
 callers of xsltCheckRead and xsltCheckWrite permit access even upon
 receiving a -1 error code. xsltCheckRead can return -1 for a crafted
 URL that is not actually invalid and is subsequently loaded.
 }}}

 We need to apply the following commit:

 
[https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6]

 Although the rest of the commits in the libxslt repo from the release of
 libxslt-1.1.33 onwards seem to be security related, so we might just want
 to create a consolidated patch. Mostly integer overflows it looks like.

--

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/12209#comment:2>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to