Search for packages
Package details: pkg:deb/debian/libxslt@1.1.26-6%2Bsqueeze3
purl pkg:deb/debian/libxslt@1.1.26-6%2Bsqueeze3
Next non-vulnerable version 1.1.35-2
Latest non-vulnerable version 1.1.35-2
Risk 4.5
Vulnerabilities affecting this package (25)
Vulnerability Summary Fixed by
VCID-28h1-3xr8-1qed
Aliases:
CVE-2016-4609
libxslt: Out-of-bounds read at xmlGetLineNoInternal()
1.1.29-2.1+deb9u2
Affected by 9 other vulnerabilities.
VCID-3js7-6ema-mucp
Aliases:
CVE-2012-2870
1.1.26-14.1
Affected by 18 other vulnerabilities.
VCID-426k-ced5-jbhk
Aliases:
CVE-2017-5029
GHSA-pf6m-fxpq-fg8v
Nokogiri gem contains two upstream vulnerabilities in libxslt 1.1.29 nokogiri version 1.7.2 has been released. This is a security update based on 1.7.1, addressing two upstream libxslt 1.1.29 vulnerabilities classified as "Medium" by Canonical and given a CVSS3 score of "6.5 Medium" and "8.8 High" by RedHat. These patches only apply when using Nokogiri's vendored libxslt package. If you're using your distro's system libraries, there's no need to upgrade from 1.7.0.1 or 1.7.1 at this time. Full details are available at the github issue linked to in the changelog below. ----- # 1.7.2 / 2017-05-09 ## Security Notes [MRI] Upstream libxslt patches are applied to the vendored libxslt 1.1.29 which address CVE-2017-5029 and CVE-2016-4738. For more information: * https://github.com/sparklemotion/nokogiri/issues/1634 * http://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-5029.html * http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4738.html
1.1.29-2.1+deb9u2
Affected by 9 other vulnerabilities.
VCID-7c35-78dy-a7cy
Aliases:
CVE-2019-11068
GHSA-qxcg-xjjg-66mj
Nokogiri gem, via libxslt, is affected by improper access control vulnerability Nokogiri v1.10.3 has been released. This is a security release. It addresses a CVE in upstream libxslt rated as "Priority: medium" by Canonical, and "NVD Severity: high" by Debian. More details are available below. If you're using your distro's system libraries, rather than Nokogiri's vendored libraries, there's no security need to upgrade at this time, though you may want to check with your distro whether they've patched this (Canonical has patched Ubuntu packages). Note that this patch is not yet (as of 2019-04-22) in an upstream release of libxslt. Full details about the security update are available in Github Issue [#1892] https://github.com/sparklemotion/nokogiri/issues/1892. --- CVE-2019-11068 Permalinks are: - Canonical: https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11068 - Debian: https://security-tracker.debian.org/tracker/CVE-2019-11068 Description: > libxslt through 1.1.33 allows bypass of a protection mechanism > because callers of xsltCheckRead and xsltCheckWrite permit access > even upon receiving a -1 error code. xsltCheckRead can return -1 for > a crafted URL that is not actually invalid and is subsequently > loaded. Canonical rates this as "Priority: Medium". Debian rates this as "NVD Severity: High (attack range: remote)".
1.1.32-2.2~deb10u1
Affected by 5 other vulnerabilities.
VCID-81dd-93hf-jycv
Aliases:
CVE-2016-4610
libxslt: Invalid memory access leading to DoS at exsltDynMapFunction()
1.1.29-2.1+deb9u2
Affected by 9 other vulnerabilities.
VCID-8ayq-ktgc-bbdt
Aliases:
CVE-2011-1202
Chris Evans of the Chrome Security Team reported that the XSLT generate-id() function returned a string that revealed a specific valid address of an object on the memory heap. It is possible that in some cases this address would be valuable information that could be used by an attacker while exploiting a different memory corruption but, in order to make an exploit more reliable or work around mitigation features in the browser or operating system.
1.1.26-14.1
Affected by 18 other vulnerabilities.
VCID-95x4-hka7-67eu
Aliases:
CVE-2025-24855
numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.
1.1.35-1+deb12u1
Affected by 2 other vulnerabilities.
VCID-a7c4-u5sp-dbg9
Aliases:
CVE-2012-6139
1.1.26-14.1
Affected by 18 other vulnerabilities.
VCID-dyxy-kh7h-w7gu
Aliases:
CVE-2011-3970
1.1.26-14.1
Affected by 18 other vulnerabilities.
VCID-e9pv-8q2s-vbb2
Aliases:
CVE-2016-1684
1.1.28-2+deb8u3
Affected by 18 other vulnerabilities.
1.1.29-2.1+deb9u2
Affected by 9 other vulnerabilities.
VCID-fwu5-dmme-cqdk
Aliases:
CVE-2012-2893
1.1.26-14.1
Affected by 18 other vulnerabilities.
VCID-m7v6-g4x2-6ue4
Aliases:
CVE-2024-55549
xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.
1.1.35-1+deb12u1
Affected by 2 other vulnerabilities.
VCID-nj6s-87nx-wbag
Aliases:
CVE-2012-2825
1.1.26-14.1
Affected by 18 other vulnerabilities.
VCID-npr9-4epg-hbc8
Aliases:
CVE-2019-13118
GHSA-cf46-6xxh-pc75
libxslt Type Confusion vulnerability that affects Nokogiri In `numbers.c` in libxslt 1.1.33, a type holding grouping characters of an `xsl:number` instruction was too narrow and an invalid character/length combination could be passed to `xsltNumberFormatDecimal`, leading to a read of uninitialized stack data. Nokogiri prior to version 1.10.5 used a vulnerable version of libxslt. Nokogiri 1.10.5 updated libxslt to version 1.1.34 to address this and other vulnerabilities in libxslt.
1.1.32-2.2~deb10u1
Affected by 5 other vulnerabilities.
VCID-pfcx-tcgz-xqab
Aliases:
CVE-2015-7995
1.1.28-2+deb8u3
Affected by 18 other vulnerabilities.
1.1.29-2.1+deb9u2
Affected by 9 other vulnerabilities.
VCID-q9r6-ge5s-tbe6
Aliases:
CVE-2016-4738
1.1.28-2+deb8u3
Affected by 18 other vulnerabilities.
1.1.29-2.1+deb9u2
Affected by 9 other vulnerabilities.
VCID-qk5b-2v19-ffde
Aliases:
CVE-2016-1683
1.1.28-2+deb8u3
Affected by 18 other vulnerabilities.
1.1.29-2.1+deb9u2
Affected by 9 other vulnerabilities.
VCID-qyqp-kns2-t3h6
Aliases:
CVE-2019-5815
GHSA-vmfx-gcfq-wvm2
Nokogiri implementation of libxslt vulnerable to heap corruption Type confusion in `xsltNumberFormatGetMultipleLevel` prior to libxslt 1.1.33 could allow attackers to potentially exploit heap corruption via crafted XML data. Nokogiri prior to version 1.10.5 contains a vulnerable version of libxslt. Nokogiri version 1.10.5 upgrades the dependency to libxslt 1.1.34, which contains a patch for this issue.
1.1.34-4+deb11u1
Affected by 4 other vulnerabilities.
VCID-rcuu-68e3-1bgq
Aliases:
CVE-2021-30560
GHSA-59gp-qqm7-cw4j
GHSA-fq42-c5rg-92c2
GMS-2022-163
Update packaged libxml2 (2.9.12 → 2.9.13) and libxslt (1.1.34 → 1.1.35) ## Summary Nokogiri v1.13.2 upgrades two of its packaged dependencies: * vendored libxml2 from v2.9.12 to v2.9.13 * vendored libxslt from v1.1.34 to v1.1.35 Those library versions address the following upstream CVEs: * libxslt: CVE-2021-30560 (CVSS 8.8, High severity) * libxml2: CVE-2022-23308 (Unspecified severity, see more information below) Those library versions also address numerous other issues including performance improvements, regression fixes, and bug fixes, as well as memory leaks and other use-after-free issues that were not assigned CVEs. Please note that this advisory only applies to the CRuby implementation of Nokogiri < 1.13.2, and only if the packaged libraries are being used. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` and `libxslt` release announcements. ## Mitigation Upgrade to Nokogiri >= 1.13.2. Users who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link an older version Nokogiri against external libraries libxml2 >= 2.9.13 and libxslt >= 1.1.35, which will also address these same CVEs. ## Impact * libxslt CVE-2021-30560 * CVSS3 score: 8.8 (High) Fixed by https://gitlab.gnome.org/GNOME/libxslt/-/commit/50f9c9c All versions of libxslt prior to v1.1.35 are affected. Applications using untrusted XSL stylesheets to transform XML are vulnerable to a denial-of-service attack and should be upgraded immediately. libxml2 CVE-2022-23308 * As of the time this security advisory was published, there is no officially published information available about this CVE's severity. The above NIST link does not yet have a published record, and the libxml2 maintainer has declined to provide a severity score. * Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/652dd12 * Further explanation is at https://mail.gnome.org/archives/xml/2022-February/msg00015.html The upstream commit and the explanation linked above indicate that an application may be vulnerable to a denial of service, memory disclosure, or code execution if it parses an untrusted document with parse options `DTDVALID` set to true, and `NOENT` set to false. An analysis of these parse options: * While `NOENT` is off by default for Document, DocumentFragment, Reader, and Schema parsing, it is on by default for XSLT (stylesheet) parsing in Nokogiri v1.12.0 and later. * `DTDVALID` is an option that Nokogiri does not set for any operations, and so this CVE applies only to applications setting this option explicitly. It seems reasonable to assume that any application explicitly setting the parse option `DTDVALID` when parsing untrusted documents is vulnerable and should be upgraded immediately.
1.1.34-4+deb11u1
Affected by 4 other vulnerabilities.
VCID-srcb-dkss-syaf
Aliases:
CVE-2016-4608
libxslt: stack-based buffer overflow at exsltDateFormat()
1.1.29-2.1+deb9u2
Affected by 9 other vulnerabilities.
VCID-wvp6-ackd-1ba9
Aliases:
CVE-2016-1841
1.1.29-2.1+deb9u2
Affected by 9 other vulnerabilities.
VCID-yjtd-j2xx-73hm
Aliases:
CVE-2019-13117
GHSA-4hm9-844j-jmxp
Nokogiri gem, via libxslt, is affected by multiple vulnerabilities Nokogiri v1.10.5 has been released. This is a security release. It addresses three CVEs in upstream libxml2, for which details are below. If you're using your distro's system libraries, rather than Nokogiri's vendored libraries, there's no security need to upgrade at this time, though you may want to check with your distro whether they've patched this (Canonical has patched Ubuntu packages). Note that libxslt 1.1.34 addresses these vulnerabilities. Full details about the security update are available in Github Issue [#1943] https://github.com/sparklemotion/nokogiri/issues/1943. --- CVE-2019-13117 https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13117.html Priority: Low Description: In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character. Patched with commit https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1 --- CVE-2019-13118 https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-13118.html Priority: Low Description: In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data Patched with commit https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b --- CVE-2019-18197 https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-18197.html Priority: Medium Description: In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed. Patched with commit https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285
1.1.32-2.2~deb10u1
Affected by 5 other vulnerabilities.
VCID-zghx-r86h-s7ef
Aliases:
CVE-2019-18197
GHSA-242x-7cm6-4w8j
Nokogiri affected by libxslt Use of Uninitialized Resource/ Use After Free vulnerability In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed. Nokogiri prior to version 1.10.5 contains a vulnerable version of libxslt. Nokogiri version 1.10.5 upgrades the dependency to libxslt 1.1.34, which contains a patch for this issue.
1.1.34-4+deb11u1
Affected by 4 other vulnerabilities.
VCID-zzg9-2pnc-ebbe
Aliases:
CVE-2012-2871
1.1.26-14.1
Affected by 18 other vulnerabilities.
VCID-zzss-bhvr-sbfu
Aliases:
CVE-2015-9019
libxslt: math.random() in xslt uses unseeded randomness
1.1.32-2.2~deb10u1
Affected by 5 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2025-08-16T20:07:40.808244+00:00 Debian Oval Importer Affected by VCID-zzss-bhvr-sbfu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:11:37.768705+00:00 Debian Oval Importer Affected by VCID-wvp6-ackd-1ba9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T19:05:37.114777+00:00 Debian Oval Importer Affected by VCID-pfcx-tcgz-xqab https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:49:14.497561+00:00 Debian Oval Importer Affected by VCID-3js7-6ema-mucp https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:39:18.372204+00:00 Debian Oval Importer Affected by VCID-e9pv-8q2s-vbb2 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:33:11.688006+00:00 Debian Oval Importer Affected by VCID-q9r6-ge5s-tbe6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T18:14:00.385217+00:00 Debian Oval Importer Affected by VCID-yjtd-j2xx-73hm https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T17:06:20.241978+00:00 Debian Oval Importer Affected by VCID-zghx-r86h-s7ef https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T16:42:00.453356+00:00 Debian Oval Importer Affected by VCID-8ayq-ktgc-bbdt https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:21:08.889937+00:00 Debian Oval Importer Affected by VCID-fwu5-dmme-cqdk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T15:05:32.161891+00:00 Debian Oval Importer Affected by VCID-7c35-78dy-a7cy https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:20:13.446090+00:00 Debian Oval Importer Affected by VCID-rcuu-68e3-1bgq https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T14:10:54.718755+00:00 Debian Oval Importer Affected by VCID-zzg9-2pnc-ebbe https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:52:19.197822+00:00 Debian Oval Importer Affected by VCID-a7c4-u5sp-dbg9 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:38:53.982987+00:00 Debian Oval Importer Affected by VCID-nj6s-87nx-wbag https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:37:29.186347+00:00 Debian Oval Importer Affected by VCID-95x4-hka7-67eu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T13:00:15.597309+00:00 Debian Oval Importer Affected by VCID-qk5b-2v19-ffde https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:55:56.135033+00:00 Debian Oval Importer Affected by VCID-dyxy-kh7h-w7gu https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:51:23.657493+00:00 Debian Oval Importer Affected by VCID-qyqp-kns2-t3h6 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:44:18.136143+00:00 Debian Oval Importer Affected by VCID-srcb-dkss-syaf https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:41:41.977578+00:00 Debian Oval Importer Affected by VCID-m7v6-g4x2-6ue4 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:34:27.095213+00:00 Debian Oval Importer Affected by VCID-npr9-4epg-hbc8 https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T12:34:05.896477+00:00 Debian Oval Importer Affected by VCID-28h1-3xr8-1qed https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:57:04.948666+00:00 Debian Oval Importer Affected by VCID-81dd-93hf-jycv https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T11:55:12.847137+00:00 Debian Oval Importer Affected by VCID-426k-ced5-jbhk https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 37.0.0
2025-08-01T10:30:44.430576+00:00 Debian Oval Importer Affected by VCID-q9r6-ge5s-tbe6 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:08:28.833054+00:00 Debian Oval Importer Affected by VCID-pfcx-tcgz-xqab https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T10:00:33.473801+00:00 Debian Oval Importer Affected by VCID-e9pv-8q2s-vbb2 https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0
2025-08-01T09:50:36.486399+00:00 Debian Oval Importer Affected by VCID-qk5b-2v19-ffde https://www.debian.org/security/oval/oval-definitions-jessie.xml.bz2 37.0.0