From redhat bugzilla at $URL: Common Vulnerabilities and Exposures assigned an identifier CVE-2011-3970 to the following vulnerability: Name: CVE-2011-3970 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970 Assigned: 20111001 Reference: CONFIRM:http://code.google.com/p/chromium/issues/detail?id=110277 Reference: CONFIRM:http://googlechromereleases.blogspot.com/2012/02/stable-channel-update.html libxslt, as used in Google Chrome before 17.0.963.46, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors. patch: http://git.gnome.org/browse/libxslt/commit/?id=fe5a4fa33eb85bce3253ed3742b1ea6c4b59b41b
Thanks for reporting, fixed in libxslt-1.1.26-r3. >*libxslt-1.1.26-r3 (09 Feb 2012) > > 09 Feb 2012; Alexandre Rostovtsev <tetromino@gentoo.org> > -libxslt-1.1.26.ebuild, -libxslt-1.1.26-r1.ebuild, +libxslt-1.1.26-r3.ebuild, > +files/libxslt-1.1.26-pattern-out-of-bounds-read.patch: > Fix out-of-bounds read in xsltCompilePatternInternal (bug #402861, > CVE-2011-3970, thanks to Agostino Sarubbo for reporting). Update to EAPI4. > Drop old.
Thanks Alexandre. Arches, please test and mark stable =dev-libs/libxslt-1.1.26-r3 target keywords : "alpha amd64 arm hppa ia64 m68k ppc ppc64 s390 sh sparc x86"
Passed test phase, rev deps. amd64 looks ok
amd64 ok
amd64 stable
Stable for HPPA.
x86 stable
alpha/arm/ia64/m68k/s390/sh/sparc stable
ppc done
ppc64 done, last arch done
@security: please vote.
Thanks, everyone. GLSA Vote: yes.
GLSA vote: yes. Creating GLSA request.
This issue was resolved and addressed in GLSA 201203-08 at http://security.gentoo.org/glsa/glsa-201203-08.xml by GLSA coordinator Sean Amoss (ackle).