openSUSE Security Update : libxslt (openSUSE-2017-609)

High Nessus Plugin ID 100367


The remote openSUSE host is missing a security update.


This update for libxslt fixes the following security issues :

- CVE-2017-5029: The xsltAddTextString function in transform.c lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page (bsc#1035905).

- CVE-2016-4738: Fix heap overread in xsltFormatNumberConversion: An empty decimal-separator could cause a heap overread. This can be exploited to leak a couple of bytes after the buffer that holds the pattern string (bsc#1005591).

- CVE-2015-9019: Properly initialize random generator (bsc#934119).

- CVE-2015-7995: Vulnerability in function xsltStylePreCompute' in preproc.c could cause a type confusion leading to DoS. (bsc#952474) This update was imported from the SUSE:SLE-12:Update update project.


Update the affected libxslt packages.

See Also

Plugin Details

Severity: High

ID: 100367

File Name: openSUSE-2017-609.nasl

Version: $Revision: 3.1 $

Type: local

Agent: unix

Published: 2017/05/24

Modified: 2017/05/24

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C


Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libxslt-debugsource, p-cpe:/a:novell:opensuse:libxslt-devel, p-cpe:/a:novell:opensuse:libxslt-devel-32bit, p-cpe:/a:novell:opensuse:libxslt-python, p-cpe:/a:novell:opensuse:libxslt-python-debuginfo, p-cpe:/a:novell:opensuse:libxslt-python-debugsource, p-cpe:/a:novell:opensuse:libxslt-tools, p-cpe:/a:novell:opensuse:libxslt-tools-debuginfo, p-cpe:/a:novell:opensuse:libxslt1, p-cpe:/a:novell:opensuse:libxslt1-32bit, p-cpe:/a:novell:opensuse:libxslt1-debuginfo, p-cpe:/a:novell:opensuse:libxslt1-debuginfo-32bit, cpe:/o:novell:opensuse:42.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2017/05/23

Reference Information

CVE: CVE-2015-7995, CVE-2015-9019, CVE-2016-4738, CVE-2017-5029