Steffen Joeris
2008-May-24 10:16 UTC
[Secure-testing-team] Bug#482664: CVE-2008-1767: buffver overflow in pattern.c
Package: libxslt1.1 Version: 1.1.23-1 Severity: grave Tags: security, patch Justification: user security hole Hi The following CVE(0) has been issued against libxslt. CVE-2008-1767: Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps. Upstream patch is attached. Please mention the CVE id in your changelog, when you fix this bug. Cheers Steffen (0): http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1767 -------------- next part -------------- A non-text attachment was scrubbed... Name: patch Type: text/x-c Size: 7039 bytes Desc: not available Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080524/e4b292e4/attachment.bin