libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/04/22/1 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/04/23/5 Mailing List Third Party Advisory
https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6 Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00016.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/
https://security.netapp.com/advisory/ntap-20191017-0001/ Third Party Advisory
https://usn.ubuntu.com/3947-1/ Third Party Advisory
https://usn.ubuntu.com/3947-2/ Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html Patch Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-04-10T19:38:18

Updated: 2019-10-17T15:06:40

Reserved: 2019-04-10T00:00:00


Link: CVE-2019-11068

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2019-04-10T20:29:01.147

Modified: 2023-11-07T03:02:39.167


Link: CVE-2019-11068

JSON object: View

cve-icon Redhat Information

No data.