Use After Free Affecting libxslt package, versions <1.1.32-2.2~deb10u1
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-LIBXSLT-473888
- published 19 Oct 2019
- disclosed 18 Oct 2019
How to fix?
Upgrade Debian:10
libxslt
to version 1.1.32-2.2~deb10u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream libxslt
package and not the libxslt
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197
- https://security.netapp.com/advisory/ntap-20200416-0004/
- https://lists.debian.org/debian-lts-announce/2019/10/msg00037.html
- https://security-tracker.debian.org/tracker/CVE-2019-18197
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914
- https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://security.netapp.com/advisory/ntap-20191031-0004/
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html
- http://www.openwall.com/lists/oss-security/2019/11/17/2
- https://access.redhat.com/errata/RHSA-2020:0514
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-18197
- https://usn.ubuntu.com/4164-1/