Bug 1714979 (CVE-2016-4609)

Summary: CVE-2016-4609 libxslt: Out-of-bounds read at xmlGetLineNoInternal()
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: apevec, dking, erik-fedora, igor.raits, jjoyce, jschluet, klember, lhh, lpeer, mburns, rjones, sclewis, sisharma, slinaber, veillard
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: libxslt 1.1.29 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-10-27 10:45:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1714986, 1714987, 1718101, 1725528    
Bug Blocks: 1714985    

Description Dhananjay Arunesh 2019-05-29 10:21:32 UTC
libxslt before 9.3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4607, CVE-2016-4608, CVE-2016-4610, and
CVE-2016-4612.

Reference:
https://seclists.org/oss-sec/2017/q2/385

Comment 1 Dhananjay Arunesh 2019-05-29 10:30:12 UTC
Created libxslt tracking bugs for this issue:

Affects: fedora-all [bug 1714986]


Created mingw-libxslt tracking bugs for this issue:

Affects: fedora-all [bug 1714987]

Comment 5 Marco Benatto 2019-06-06 21:41:40 UTC
Upstream commit for this issue: https://git.gnome.org/browse/libxslt/commit/?id=8b90c9a699e0eaa98bbeec63a473ddc73aaa238c

Comment 8 Marco Benatto 2019-06-10 23:05:49 UTC
There's a bug on libxsl before version 1.1.29 where a crafted xsl stylesheet and XML document lead to an out of band
read at xmlGetLineNoInternal() from libxml2. The error happens due to improper input validation on libxslt's function
exsltSaxonLineNumberFunction() when it tries to retrieve the line number for a namespace node, this bug can be leveraged
to cause DoS as the out of band read will cause segmentation fault error.

Comment 9 Marco Benatto 2019-06-10 23:11:15 UTC
Statement:

Red Hat OpenStack will consume fixes from the base Red Hat Enterprise Linux Operating System. Therefore the package provided by Red Hat OpenStack has been marked as will not fix.

This issue affects the version of libxslt as shipped with Red Hat Enterprise Linux 5, 6 and 7 and was rated as having Moderated security impact by the Red Hat Product Security.
An eventual update for Red Hat Enterprise Linux 7 may address this issue.

Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.