| Summary: | libxslt new security issue CVE-2012-6139 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | major | ||
| Priority: | Normal | CC: | davidwhodgins, sysadmin-bugs, tmb |
| Version: | 2 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/545585/ | ||
| Whiteboard: | MGA2-64-OK MGA2-32-OK | ||
| Source RPM: | libxslt-1.1.26-6.20120127.4.mga2.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2013-04-02 20:44:51 CEST
Note to QA: Information about PoCs here: http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-6139.html Testing complete on Mageia 2 i586 and x86_64. Confirmed the segfault is fixed. Could someone from the sysadmin team push the srpm libxslt-1.1.26-6.20120127.5.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates. Advisory: Updated libxslt packages fix security vulnerability: Nicholas Gregoire discovered that libxslt incorrectly handled certain empty values. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could cause libxslt to crash, causing a denial of service (CVE-2012-6139). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139 http://www.ubuntu.com/usn/usn-1784-1/ https://bugs.mageia.org/show_bug.cgi?id=9592 Keywords:
(none) =>
validated_update Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107 Status:
NEW =>
RESOLVED |