diff options
-rw-r--r-- | security/apache-xml-security-c/Makefile | 2 | ||||
-rw-r--r-- | security/apache-xml-security-c/distinfo | 4 | ||||
-rw-r--r-- | security/vuxml/vuln.xml | 29 |
3 files changed, 32 insertions, 3 deletions
diff --git a/security/apache-xml-security-c/Makefile b/security/apache-xml-security-c/Makefile index eac1dde..69c4d10 100644 --- a/security/apache-xml-security-c/Makefile +++ b/security/apache-xml-security-c/Makefile @@ -2,7 +2,7 @@ # $FreeBSD$ PORTNAME= xml-security-c -PORTVERSION= 1.7.1 +PORTVERSION= 1.7.2 CATEGORIES= security MASTER_SITES= ${MASTER_SITE_APACHE} MASTER_SITE_SUBDIR=santuario/c-library diff --git a/security/apache-xml-security-c/distinfo b/security/apache-xml-security-c/distinfo index 4595c12..1644d7c 100644 --- a/security/apache-xml-security-c/distinfo +++ b/security/apache-xml-security-c/distinfo @@ -1,2 +1,2 @@ -SHA256 (xml-security-c-1.7.1.tar.gz) = 3d306660702d620b30605627f970b90667ed967211a8fc26b3243e6d3abeb32e -SIZE (xml-security-c-1.7.1.tar.gz) = 875367 +SHA256 (xml-security-c-1.7.2.tar.gz) = d576b07bb843eaebfde3be01301db40504ea8e8e477c0ad5f739b07022445452 +SIZE (xml-security-c-1.7.2.tar.gz) = 875465 diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 0e5f119..90769a4 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,35 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="81da673e-dfe1-11e2-9389-08002798f6ff"> + <topic>apache-xml-security-c -- heap overflow during XPointer evaluation</topic> + <affects> + <package> + <name>apache-xml-security-c</name> + <range><lt>1.7.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Apache Software Foundation reports:</p> + <blockquote cite="http://santuario.apache.org/secadv.data/CVE-2013-2210.txt"> + <p>The attempted fix to address CVE-2013-2154 introduced the + possibility of a heap overflow, possibly leading to arbitrary code + execution, in the processing of malformed XPointer expressions in the + XML Signature Reference processing code.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-2210</cvename> + <url>http://santuario.apache.org/secadv.data/CVE-2013-2210.txt</url> + </references> + <dates> + <discovery>2013-06-27</discovery> + <entry>2013-06-28</entry> + </dates> + </vuln> + <vuln vid="b3fcb387-de4b-11e2-b1c6-0025905a4771"> <topic>mozilla -- multiple vulnerabilities</topic> <affects> |