Opened 5 years ago

Last modified 5 years ago

#12209 closed enhancement

Fix CVE-2019-11068 in libxslt (Security Framework Bypass) — at Initial Version

Reported by: Douglas R. Reno Owned by: blfs-book
Priority: high Milestone: 9.0
Component: BOOK Version: SVN
Severity: normal Keywords:
Cc:

Description

I noticed a Debian Security Update for this on one of my debian machines, and thought it was worth a look into. After finding it, I came across this:

https://nvd.nist.gov/vuln/detail/CVE-2019-11068

libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.

We need to apply the following commit:

https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6

Although the rest of the commits in the libxslt repo from the release of libxslt-1.1.33 onwards seem to be security related, so we might just want to create a consolidated patch. Mostly integer overflows it looks like.

Change History (0)

Note: See TracTickets for help on using tickets.