First published: Fri Oct 18 2019(Updated: )
A vulnerabiliy was found in xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed. Reference: <a href="https://security.netapp.com/advisory/ntap-20191031-0004/">https://security.netapp.com/advisory/ntap-20191031-0004/</a> <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746</a> <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768</a> <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914</a> <a href="https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285">https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xmlsoft Libxslt | =1.1.33 | |
Linux Linux kernel | ||
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
Debian Debian Linux | =8.0 | |
All of | ||
Xmlsoft Libxslt | =1.1.33 | |
Linux Linux kernel | ||
redhat/libxslt | <1.1.34 | 1.1.34 |
debian/libxslt | 1.1.34-4+deb11u1 1.1.35-1 1.1.35-1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-18197.
The severity level of CVE-2019-18197 is high.
The affected software is libxslt version 1.1.33.
To fix CVE-2019-18197, you should update to libxslt version 1.1.34 or higher.
Yes, you can find references for CVE-2019-18197 at the following links: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html), [Reference 2](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html), [Reference 3](http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html).