svn commit: r321955 - in head/security: apache-xml-security-c vuxml
Palle Girgensohn
girgen at FreeBSD.org
Fri Jun 28 11:07:50 UTC 2013
Author: girgen
Date: Fri Jun 28 11:07:48 2013
New Revision: 321955
URL: http://svnweb.freebsd.org/changeset/ports/321955
Log:
Security update for apache-xml-security-c
URL: http://santuario.apache.org/secadv.data/CVE-2013-2210.txt
Security: 81da673e-dfe1-11e2-9389-08002798f6ff
Security: CVE-2013-2210
Modified:
head/security/apache-xml-security-c/Makefile
head/security/apache-xml-security-c/distinfo
head/security/vuxml/vuln.xml
Modified: head/security/apache-xml-security-c/Makefile
==============================================================================
--- head/security/apache-xml-security-c/Makefile Fri Jun 28 10:50:51 2013 (r321954)
+++ head/security/apache-xml-security-c/Makefile Fri Jun 28 11:07:48 2013 (r321955)
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= xml-security-c
-PORTVERSION= 1.7.1
+PORTVERSION= 1.7.2
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_APACHE}
MASTER_SITE_SUBDIR=santuario/c-library
Modified: head/security/apache-xml-security-c/distinfo
==============================================================================
--- head/security/apache-xml-security-c/distinfo Fri Jun 28 10:50:51 2013 (r321954)
+++ head/security/apache-xml-security-c/distinfo Fri Jun 28 11:07:48 2013 (r321955)
@@ -1,2 +1,2 @@
-SHA256 (xml-security-c-1.7.1.tar.gz) = 3d306660702d620b30605627f970b90667ed967211a8fc26b3243e6d3abeb32e
-SIZE (xml-security-c-1.7.1.tar.gz) = 875367
+SHA256 (xml-security-c-1.7.2.tar.gz) = d576b07bb843eaebfde3be01301db40504ea8e8e477c0ad5f739b07022445452
+SIZE (xml-security-c-1.7.2.tar.gz) = 875465
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Fri Jun 28 10:50:51 2013 (r321954)
+++ head/security/vuxml/vuln.xml Fri Jun 28 11:07:48 2013 (r321955)
@@ -51,6 +51,35 @@ Note: Please add new entries to the beg
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="81da673e-dfe1-11e2-9389-08002798f6ff">
+ <topic>apache-xml-security-c -- heap overflow during XPointer evaluation</topic>
+ <affects>
+ <package>
+ <name>apache-xml-security-c</name>
+ <range><lt>1.7.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Apache Software Foundation reports:</p>
+ <blockquote cite="http://santuario.apache.org/secadv.data/CVE-2013-2210.txt">
+ <p>The attempted fix to address CVE-2013-2154 introduced the
+ possibility of a heap overflow, possibly leading to arbitrary code
+ execution, in the processing of malformed XPointer expressions in the
+ XML Signature Reference processing code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-2210</cvename>
+ <url>http://santuario.apache.org/secadv.data/CVE-2013-2210.txt</url>
+ </references>
+ <dates>
+ <discovery>2013-06-27</discovery>
+ <entry>2013-06-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b3fcb387-de4b-11e2-b1c6-0025905a4771">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-head
mailing list