In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Aug/11 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Aug/13 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Aug/14 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Aug/15 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jul/22 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jul/23 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jul/24 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jul/26 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jul/31 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jul/37 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2019/Jul/38 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/11/17/2 Mailing List Third Party Advisory
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15069 Permissions Required
https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b Patch Third Party Advisory
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/
https://oss-fuzz.com/testcase-detail/5197371471822848 Permissions Required
https://seclists.org/bugtraq/2019/Aug/21 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Aug/22 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Aug/23 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Aug/25 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/35 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/36 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/37 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/40 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/41 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/Jul/42 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20190806-0004/ Third Party Advisory
https://security.netapp.com/advisory/ntap-20200122-0003/ Third Party Advisory
https://support.apple.com/kb/HT210346 Third Party Advisory
https://support.apple.com/kb/HT210348 Third Party Advisory
https://support.apple.com/kb/HT210351 Third Party Advisory
https://support.apple.com/kb/HT210353 Third Party Advisory
https://support.apple.com/kb/HT210356 Third Party Advisory
https://support.apple.com/kb/HT210357 Third Party Advisory
https://support.apple.com/kb/HT210358 Third Party Advisory
https://usn.ubuntu.com/4164-1/ Third Party Advisory
https://www.oracle.com/security-alerts/cpujan2020.html Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-07-01T01:27:39

Updated: 2021-06-29T14:08:54

Reserved: 2019-06-30T00:00:00


Link: CVE-2019-13118

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2019-07-01T02:15:09.800

Modified: 2023-11-07T03:03:46.887


Link: CVE-2019-13118

JSON object: View

cve-icon Redhat Information

No data.

CWE