svn commit: r418386 - head/security/vuxml
Torsten Zuehlsdorff
tz at FreeBSD.org
Mon Jul 11 15:31:12 UTC 2016
Author: tz
Date: Mon Jul 11 15:31:10 2016
New Revision: 418386
URL: https://svnweb.freebsd.org/changeset/ports/418386
Log:
rubygem-ruby-saml: Document XML signature wrapping attack
Security: CVE-2016-5697
Security: https://vuxml.freebsd.org/freebsd/3fcd52b2-4510-11e6-a15f-00248c0c745d.html
Approved by: junovitch (mentor)
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Mon Jul 11 14:06:44 2016 (r418385)
+++ head/security/vuxml/vuln.xml Mon Jul 11 15:31:10 2016 (r418386)
@@ -58,6 +58,38 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="3fcd52b2-4510-11e6-a15f-00248c0c745d">
+ <topic>ruby-saml -- XML signature wrapping attack</topic>
+ <affects>
+ <package>
+ <name>rubygem-ruby-saml</name>
+ <range><lt>1.3.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>RubySec reports:</p>
+ <blockquote cite="http://rubysec.com/advisories/CVE-2016-5697/">
+ <p>ruby-saml prior to version 1.3.0 is vulnerable to an XML signature wrapping attack
+ in the specific scenario where there was a signature that referenced at the same
+ time 2 elements (but past the scheme validator process since 1 of the element was
+ inside the encrypted assertion).</p>
+ <p>ruby-saml users must update to 1.3.0, which implements 3 extra validations to
+ mitigate this kind of attack.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-5697</cvename>
+ <url>http://rubysec.com/advisories/CVE-2016-5697/</url>
+ <url>https://github.com/onelogin/ruby-saml/commit/a571f52171e6bfd87db59822d1d9e8c38fb3b995</url>
+ </references>
+ <dates>
+ <discovery>2016-06-24</discovery>
+ <entry>2016-07-08</entry>
+ </dates>
+ </vuln>
+
<vuln vid="7d64d00c-43e3-11e6-ab34-002590263bf5">
<topic>quassel -- remote denial of service</topic>
<affects>
More information about the svn-ports-head
mailing list