Bug 1716448 (CVE-2016-4610)
| Summary: | CVE-2016-4610 libxslt: Invalid memory access leading to DoS at exsltDynMapFunction() | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | apevec, dking, erik-fedora, igor.raits, jjoyce, jschluet, klember, lhh, lpeer, mburns, rjones, sclewis, sisharma, slinaber, veillard |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | libxslt 1.1.29 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-10-27 03:29:16 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1716458, 1716459, 1718310, 1725529 | ||
| Bug Blocks: | 1714985 | ||
|
Description
Dhananjay Arunesh
2019-06-03 14:22:48 UTC
Created libxslt tracking bugs for this issue: Affects: fedora-all [bug 1716458] Created mingw-libxslt tracking bugs for this issue: Affects: fedora-all [bug 1716459] Upstream commit for this issue: https://gitlab.gnome.org/GNOME/libxslt/commit/93bb314768aafaffad1df15bbee10b7c5423e283 The exsltDynMapFunction() function from libxslt before version 1.1.29 doesn't handle namespace entries correctly. As libxslt uses libxml2 for XML parsing, it should consider namespace entries as xmlNs objects but handles them as a standard xmlNode instead. This error causes a invalid memory access within libxml2 when trying to apply a XSL stylesheet. An attacker can leverage this by using a crafted XSL and XML files to cause DoS. Statement: Red Hat OpenStack will consume fixes from the base Red Hat Enterprise Linux Operating System. Therefore the package provided by Red Hat OpenStack has been marked as will not fix. This issue affects the version of libxslt as shipped with Red Hat Enterprise Linux 5, 6 and 7 and was rated as having Moderated security impact by the Red Hat Product Security. An eventual update for Red Hat Enterprise Linux 7 may address this issue. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. |