[CVE-2008-1767] Buffer overflow in libxslt

Bug #235909 reported by Till Ulen
254
Affects Status Importance Assigned to Milestone
libxslt (Debian)
Fix Released
Unknown
libxslt (Ubuntu)
Fix Released
Low
Kees Cook
Dapper
Fix Released
Low
Kees Cook
Feisty
Fix Released
Low
Kees Cook
Gutsy
Fix Released
Low
Kees Cook
Hardy
Fix Released
Low
Kees Cook
Intrepid
Fix Released
Low
Kees Cook

Bug Description

CVE-2008-1767 description:

"It was discovered that libxslt, an XSLT processing runtime library,
could be coerced into executing arbitrary code via a buffer overflow
when an XSL style sheet file with a long XSLT "transformation match"
condition triggered a large number of steps."

http://www.debian.org/security/2008/dsa-1589
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1767
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1767

CVE References

Changed in libxslt:
status: Unknown → Fix Released
Revision history for this message
Kees Cook (kees) wrote :

This has been published: http://www.ubuntu.com/usn/usn-633-1

Changed in libxslt:
assignee: nobody → kees
importance: Undecided → Low
status: New → Fix Released
Kees Cook (kees)
Changed in libxslt:
assignee: nobody → kees
importance: Undecided → Low
status: New → Fix Released
assignee: nobody → kees
importance: Undecided → Low
status: New → Fix Released
assignee: nobody → kees
importance: Undecided → Low
status: New → Fix Released
assignee: nobody → kees
importance: Undecided → Low
status: New → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.