Ubuntu has issued an advisory today (April 2): http://www.ubuntu.com/usn/usn-1784-1/ Cauldron is not affected (already fixed upstream in 1.1.28). Patched package uploaded for Mageia 2. Patch added to Mageia 1 SVN. Advisory: ======================== Updated libxslt packages fix security vulnerability: Nicholas Gregoire discovered that libxslt incorrectly handled certain empty values. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could cause libxslt to crash, causing a denial of service (CVE-2012-6139). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139 http://www.ubuntu.com/usn/usn-1784-1/ ======================== Updated packages in core/updates_testing: ======================== xsltproc-1.1.26-6.20120127.5.mga2 libxslt1-1.1.26-6.20120127.5.mga2 python-libxslt-1.1.26-6.20120127.5.mga2 libxslt-devel-1.1.26-6.20120127.5.mga2 from libxslt-1.1.26-6.20120127.5.mga2.src.rpm Reproducible: Steps to Reproduce:
Note to QA: Information about PoCs here: http://people.canonical.com/~ubuntu-security/cve/2012/CVE-2012-6139.html
Testing complete on Mageia 2 i586 and x86_64. Confirmed the segfault is fixed. Could someone from the sysadmin team push the srpm libxslt-1.1.26-6.20120127.5.mga2.src.rpm from Mageia 2 Core Updates Testing to Core Updates. Advisory: Updated libxslt packages fix security vulnerability: Nicholas Gregoire discovered that libxslt incorrectly handled certain empty values. If a user or automated system were tricked into processing a specially crafted XSLT document, a remote attacker could cause libxslt to crash, causing a denial of service (CVE-2012-6139). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139 http://www.ubuntu.com/usn/usn-1784-1/ https://bugs.mageia.org/show_bug.cgi?id=9592
Keywords: (none) => validated_updateWhiteboard: (none) => MGA2-64-OK MGA2-32-OKCC: (none) => davidwhodgins, sysadmin-bugs
Update pushed: https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0107
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED