From ${URL} : Description Two vulnerabilities have been reported in libxslt, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error within the "xsltDocumentFunction()" function (libxslt/functions.c) when parsing XSL templates can be exploited to cause a crash. 2) A NULL-pointer dereference error within the "xsltAddKey()" function (libxslt/keys.c) when parsing XSL keys can be exploited to cause a crash. The vulnerabilities are reported in versions prior to 1.1.28. Solution Update to version 1.1.28. Provided and/or discovered by The vendor credits Nicolas Gregoire. Original Advisory https://bugzilla.gnome.org/show_bug.cgi?id=685328 https://bugzilla.gnome.org/show_bug.cgi?id=685330 Nothing to do here for the gnome team.
@security, please add it to existing glsa.
(In reply to comment #1) > @security, please add it to existing glsa. Added and updated. Thank you. Side note for GLSA reviewers: both issues CVE MERGED to CVE-2012-6139 [1] [1] http://seclists.org/oss-sec/2013/q1/738
CVE-2012-6139 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6139): libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.
We don't have <dev-libs/libxslt-1.1.28 in the tree any more since March 2013. Maybe it's finally time to mark this bug as resolved? :)
This issue was resolved and addressed in GLSA 201401-07 at http://security.gentoo.org/glsa/glsa-201401-07.xml by GLSA coordinator Sergey Popov (pinkbyte).