In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.
https://www.oracle.com/security-alerts/cpujan2020.html
https://usn.ubuntu.com/4164-1/
https://support.apple.com/kb/HT210358
https://support.apple.com/kb/HT210357
https://support.apple.com/kb/HT210356
https://support.apple.com/kb/HT210353
https://support.apple.com/kb/HT210351
https://support.apple.com/kb/HT210348
https://support.apple.com/kb/HT210346
https://security.netapp.com/advisory/ntap-20200122-0003/
https://security.netapp.com/advisory/ntap-20190806-0004/
https://seclists.org/bugtraq/2019/Jul/42
https://seclists.org/bugtraq/2019/Jul/41
https://seclists.org/bugtraq/2019/Jul/40
https://seclists.org/bugtraq/2019/Jul/37
https://seclists.org/bugtraq/2019/Jul/36
https://seclists.org/bugtraq/2019/Jul/35
https://seclists.org/bugtraq/2019/Aug/25
https://seclists.org/bugtraq/2019/Aug/23
https://seclists.org/bugtraq/2019/Aug/22
https://seclists.org/bugtraq/2019/Aug/21
https://oss-fuzz.com/testcase-detail/5197371471822848
https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html
https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b
https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15069
http://www.openwall.com/lists/oss-security/2019/11/17/2
http://seclists.org/fulldisclosure/2019/Jul/38
http://seclists.org/fulldisclosure/2019/Jul/37
http://seclists.org/fulldisclosure/2019/Jul/31
http://seclists.org/fulldisclosure/2019/Jul/26
http://seclists.org/fulldisclosure/2019/Jul/24
http://seclists.org/fulldisclosure/2019/Jul/23
http://seclists.org/fulldisclosure/2019/Jul/22
http://seclists.org/fulldisclosure/2019/Aug/15
http://seclists.org/fulldisclosure/2019/Aug/14
http://seclists.org/fulldisclosure/2019/Aug/13
http://seclists.org/fulldisclosure/2019/Aug/11
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html