Package: libxslt / 1.1.28-2+deb8u3
Metadata
Package | Version | Patches format |
---|---|---|
libxslt | 1.1.28-2+deb8u3 | 3.0 (quilt) |
Patch series
view the series filePatch | File delta | Description |
---|---|---|
0001 patch xslt config to add private libraries.patch | (download) |
libexslt.pc.in |
1 1 + 0 - 0 ! |
patch xslt-config to add private libraries |
0002 fix autoconf automake.patch | (download) |
configure.in |
9 5 + 4 - 0 ! |
fix autoconf automake |
0003 fix typo.patch | (download) |
doc/APIchunk6.html |
2 1 + 1 - 0 ! |
fix typo |
0004 Adding doc update related to 1.1.28.patch | (download) |
NEWS |
23 23 + 0 - 0 ! |
adding doc update related to 1.1.28 |
0005 Fix a couple of places where f printf parameters wer.patch | (download) |
python/libxslt.c |
10 5 + 5 - 0 ! |
fix a couple of places where (f)printf parameters were broken As reported by Thomas Jarosch <thomas.jarosch@intra2net.com> |
0006 Initialize pseudo random number generator with curre.patch | (download) |
xsltproc/xsltproc.c |
15 15 + 0 - 0 ! |
initialize pseudo random number generator with current time or optional command line parameter |
0007 EXSLT function str replace is broken as is.patch | (download) |
libexslt/strings.c |
6 1 + 5 - 0 ! |
exslt function str:replace() is broken as-is the str:replace() function is no longer usable without a transform context. I take it from the bug report that it is not supposed to be used from plain XPath but only from XSLT according to the EXSLT specification. However, the previous implementation used to work in XPath and is still registered on an xmlXPathContext by the exsltStrXpathCtxtRegister() function. When called from plain XPath, it results in a memory error in line 526 (exsltStrReturnString()) of strings.c because xsltCreateRVT() returns NULL as an error indicator due to a NULL transform context being passed in, which was the return value from xsltXPathGetTransformContext() a bit further up (and the code doesn't validate that). Since fixing the function looks impossible, best is to remove it. |
0008 Fix quoting of xlocale test program in configure.in.patch | (download) |
configure.in |
14 7 + 7 - 0 ! |
fix quoting of xlocale test program in configure.in Double square brackets aren't needed anymore, probably due to the changes in commit a2cd8a03. |
0009 Fix for type confusion in preprocessing attributes.patch | (download) |
libxslt/preproc.c |
3 2 + 1 - 0 ! |
[patch] fix for type confusion in preprocessing attributes CVE-2015-7995 http://www.openwall.com/lists/oss-security/2015/10/27/10 We need to check that the parent node is an element before dereferencing its namespace |
0010 Always initialize EXSLT month and day to 1.patch | (download) |
libexslt/date.c |
17 7 + 10 - 0 ! |
[patch] always initialize exslt month and day to 1 Fixes bug #757970 https://bugzilla.gnome.org/show_bug.cgi?id=757970 |
0011 Fix use after free in xsltDocumentFunctionLoadDocume.patch | (download) |
libxslt/functions.c |
3 2 + 1 - 0 ! |
[patch] fix use-after-free in xsltdocumentfunctionloaddocument Also fixes a memory leak in an unlikely error case. Fixes bug #758291 https://bugzilla.gnome.org/show_bug.cgi?id=758291 |
0012 Fix xsltNumberFormatGetMultipleLevel.patch | (download) |
libxslt/numbers.c |
82 47 + 35 - 0 ! |
[patch] fix xsltnumberformatgetmultiplelevel Namespace nodes are actually an xmlNs, not an xmlNode. They must be special-cased in xsltNumberFormatGetMultipleLevel to avoid an out-of-bounds heap access. Move the test whether a node matches the "count" pattern to a separate function to make the code more readable. As a side effect, we also compare expanded names when walking up the ancestor axis, fixing an insignificant bug. |
0013 Round xsl number values to nearest integer.patch | (download) |
libxslt/numbers.c |
2 2 + 0 - 0 ! |
[patch] round xsl:number values to nearest integer This matches XSLT 2.0 behavior. |
0014 Handle negative xsl number values.patch | (download) |
libxslt/numbers.c |
17 16 + 1 - 0 ! |
[patch] handle negative xsl:number values According to XSLT 2.0, negative values are a non-recoverable dynamic error. Print an error message and treat negative values as zero. Fixes an OOB array access in xsltNumberFormatAlpha. |
0015 Lower bound for format token a.patch | (download) |
libxslt/numbers.c |
33 24 + 9 - 0 ! |
[patch] lower bound for format token "a" Handle xsl:number with format "a" and value 0 according to XSLT 2.0. Fixes an OOB array access in xsltNumberFormatAlpha. |
0016 Lower and upper bound for format token i.patch | (download) |
libxslt/numbers.c |
25 16 + 9 - 0 ! |
[patch] lower and upper bound for format token "i" Handle xsl:number with format "i" and value 0 according to XSLT 2.0. Also introduce an upper bound to fix a denial of service. |
0017 Fix double free in libexslt hash functions.patch | (download) |
libexslt/crypto.c |
15 3 + 12 - 0 ! |
[patch] fix double free in libexslt hash functions Thanks to Nicolas Gregoire for the report. Fixes bug #765271: https://bugzilla.gnome.org/show_bug.cgi?id=765271 |
0018 Fix buffer overflow in exsltDateFormat.patch | (download) |
libexslt/date.c |
2 1 + 1 - 0 ! |
[patch] fix buffer overflow in exsltdateformat Long years can overflow a stack-based buffer on 64-bit platforms by up to four bytes. Thanks to Nicolas Gregoire for the report. Fixes bug #765380: https://bugzilla.gnome.org/show_bug.cgi?id=765380 |
0019 Fix OOB heap read in xsltExtModuleRegisterDynamic.patch | (download) |
libxslt/extensions.c |
5 4 + 1 - 0 ! |
[patch] fix oob heap read in xsltextmoduleregisterdynamic xsltExtModuleRegisterDynamic would read a byte before the start of a string under certain circumstances. I looks like this piece code was supposed to strip characters from the end of the extension name, but it didn't have any effect. Don't read beyond the beginning of the string and actually strip unwanted characters. Found with afl-fuzz and ASan. |
0020 Fix heap overread in xsltFormatNumberConversion.patch | (download) |
libxslt/numbers.c |
3 2 + 1 - 0 ! |
[patch] fix heap overread in xsltformatnumberconversion An empty decimal-separator could cause a heap overread. This can be exploited to leak a couple of bytes after the buffer that holds the pattern string. Found with afl-fuzz and ASan. |
0021 Check for integer overflow in xsltAddTextString.patch | (download) |
libxslt/transform.c |
25 22 + 3 - 0 ! |
[patch] check for integer overflow in xsltaddtextstring Limit buffer size in xsltAddTextString to INT_MAX. The issue can be exploited to trigger an out of bounds write on 64-bit systems. Originally reported to Chromium: https://crbug.com/676623 |