| Summary: | libxslt new security issue CVE-2015-9019 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | herman.viaene, lewyssmith, mageia, marja11, sysadmin-bugs |
| Version: | 5 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA5-32-OK MGA5-64-OK advisory | ||
| Source RPM: | libxslt-1.1.29-5.mga6.src.rpm | CVE: | CVE-2015-9019 |
| Status comment: | |||
|
Description
David Walser
2017-05-24 12:24:04 CEST
David Walser
2017-05-24 12:24:12 CEST
Whiteboard:
(none) =>
MGA5TOO Fixed in cauldron Version:
Cauldron =>
5 Assigning to the registered maintainer. Assignee:
bugsquad =>
shlomif pushed in updates_testing: src.rpm: libxslt-1.1.29-1.3.mga5 Assignee:
shlomif =>
qa-bugs Advisory: ======================== Updated libxslt packages fix security vulnerability: The libxslt library failed to seed its random number generator, resulting in predictable random values (CVE-2015-9019). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9019 https://lists.opensuse.org/opensuse-updates/2017-05/msg00079.html ======================== Updated packages in core/updates_testing: ======================== xsltproc-1.1.29-1.3.mga5 libxslt1-1.1.29-1.3.mga5 python-libxslt-1.1.29-1.3.mga5 libxslt-devel-1.1.29-1.3.mga5 from libxslt-1.1.29-1.3.mga5.src.rpm MGA5-32 on Asus A6000VM Xfce No installation issues Followed test procedure as per bug 20760 Comment 4 (tx Dave), all tests OK. Whiteboard:
(none) =>
MGA5-32-OK
Lewis Smith
2017-06-09 21:29:50 CEST
CC:
(none) =>
lewyssmith Procedure works fine on Mageia 5 x86_64: https://wiki.mageia.org/en/QA_procedure:Libxslt Whiteboard:
MGA5-32-OK advisory =>
MGA5-32-OK MGA5-64-OK advisory Thank you both Herman & David for testing this OK. Am validating it. Keywords:
(none) =>
validated_update An update for this issue has been pushed to the Mageia Updates repository. http://advisories.mageia.org/MGASA-2017-0169.html Status:
NEW =>
RESOLVED |