[CVE-2008-1767] Buffer overflow in libxslt
Bug #235909 reported by
Till Ulen
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
libxslt (Debian) |
Fix Released
|
Unknown
|
|||
libxslt (Ubuntu) |
Fix Released
|
Low
|
Kees Cook | ||
Dapper |
Fix Released
|
Low
|
Kees Cook | ||
Feisty |
Fix Released
|
Low
|
Kees Cook | ||
Gutsy |
Fix Released
|
Low
|
Kees Cook | ||
Hardy |
Fix Released
|
Low
|
Kees Cook | ||
Intrepid |
Fix Released
|
Low
|
Kees Cook |
Bug Description
CVE-2008-1767 description:
"It was discovered that libxslt, an XSLT processing runtime library,
could be coerced into executing arbitrary code via a buffer overflow
when an XSL style sheet file with a long XSLT "transformation match"
condition triggered a large number of steps."
http://
http://
http://
CVE References
Changed in libxslt: | |
status: | Unknown → Fix Released |
Changed in libxslt: | |
assignee: | nobody → kees |
importance: | Undecided → Low |
status: | New → Fix Released |
assignee: | nobody → kees |
importance: | Undecided → Low |
status: | New → Fix Released |
assignee: | nobody → kees |
importance: | Undecided → Low |
status: | New → Fix Released |
assignee: | nobody → kees |
importance: | Undecided → Low |
status: | New → Fix Released |
To post a comment you must log in.
This has been published: http:// www.ubuntu. com/usn/ usn-633- 1