CVE-2019-13118

NameCVE-2019-13118
DescriptionIn numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1860-1
NVD severitymedium (attack range: remote)
Debian Bugs931320, 933743

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxslt (PTS)jessie1.1.28-2+deb8u3vulnerable
jessie (security)1.1.28-2+deb8u5fixed
stretch1.1.29-2.1vulnerable
buster1.1.32-2vulnerable
bullseye, sid1.1.32-2.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxsltsource(unstable)1.1.32-2.1low931320, 933743
libxsltsourcejessie1.1.28-2+deb8u5mediumDLA-1860-1

Notes

[buster] - libxslt <no-dsa> (Minor issue)
[stretch] - libxslt <no-dsa> (Minor issue)
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15069
https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b
https://oss-fuzz.com/testcase-detail/5197371471822848

Search for package or bug name: Reporting problems