Bug 20760 - libxslt new security issue CVE-2017-5029
Summary: libxslt new security issue CVE-2017-5029
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: All Linux
Priority: Normal major
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: advisory MGA5-64-OK MGA5-32-OK
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2017-05-01 01:58 CEST by David Walser
Modified: 2017-05-02 08:51 CEST (History)
3 users (show)

See Also:
Source RPM: libxslt-1.1.29-1.1.mga5.src.rpm
CVE: CVE-2017-5029
Status comment:


Attachments
cdcatalog.xml (254 bytes, text/plain)
2017-05-02 04:39 CEST, Dave Hodgins
Details
cdcatalog.xsl (536 bytes, application/xslt+xml)
2017-05-02 04:40 CEST, Dave Hodgins
Details
libxml_xslt_transform_example.py (1.56 KB, text/plain)
2017-05-02 04:41 CEST, Dave Hodgins
Details

Description David Walser 2017-05-01 01:58:11 CEST
Ubuntu has issued an advisory on April 27:
https://www.ubuntu.com/usn/usn-3271-1/

An upstream commit to fix the issue is linked from:
http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-5029.html

Mageia 5 is also affected.
David Walser 2017-05-01 01:58:19 CEST

Whiteboard: (none) => MGA5TOO

Comment 1 Nicolas Lécureuil 2017-05-01 21:26:31 CEST
Fixed in cauldron

Whiteboard: MGA5TOO => (none)
CC: (none) => mageia
CVE: (none) => CVE-2017-5029
Version: Cauldron => 5

Comment 2 Nicolas Lécureuil 2017-05-01 21:29:29 CEST
pushed in updates_testing

src.rpm: libxslt-1.1.29-1.2.mga5

Assignee: shlomif => qa-bugs

Comment 3 David Walser 2017-05-02 01:25:55 CEST
Advisory:
========================

Updated libxslt packages fix security vulnerability:

Holger Fuhrmannek discovered an integer overflow in the xsltAddTextString()
function in Libxslt. An attacker could use this to craft a malicious document
that, when opened, could cause a denial of service (application crash) or
possible execute arbitrary code (CVE-2017-5029).

References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029
https://www.ubuntu.com/usn/usn-3271-1/
========================

Updated packages in core/updates_testing:
========================
xsltproc-1.1.29-1.2.mga5
libxslt1-1.1.29-1.2.mga5
python-libxslt-1.1.29-1.2.mga5
libxslt-devel-1.1.29-1.2.mga5

from libxslt-1.1.29-1.2.mga5.src.rpm
Comment 4 Dave Hodgins 2017-05-02 04:33:15 CEST
Advisory committed to svn.

Mageia 5 x86_64 testing ok, based on
https://wiki.mageia.org/en/QA_procedure:Libxslt
though the direct download links are broken, so used copy/paste.

Testing i586 shortly.

Whiteboard: (none) => advisory MGA5-64-OK
CC: (none) => davidwhodgins

Comment 5 Dave Hodgins 2017-05-02 04:39:43 CEST
Created attachment 9258 [details]
cdcatalog.xml
Comment 6 Dave Hodgins 2017-05-02 04:40:07 CEST
Created attachment 9259 [details]
cdcatalog.xsl
Comment 7 Dave Hodgins 2017-05-02 04:41:26 CEST
Created attachment 9260 [details]
libxml_xslt_transform_example.py

Attachments added for reference in the wiki.
Comment 8 Dave Hodgins 2017-05-02 05:02:04 CEST
Mageia 5 i586 testing ok. Validating the update.

Whiteboard: advisory MGA5-64-OK => advisory MGA5-64-OK MGA5-32-OK
Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 9 Mageia Robot 2017-05-02 08:51:29 CEST
An update for this issue has been pushed to the Mageia Updates repository.

http://advisories.mageia.org/MGASA-2017-0125.html

Resolution: (none) => FIXED
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.