summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--security/apache-xml-security-c/Makefile2
-rw-r--r--security/apache-xml-security-c/distinfo4
-rw-r--r--security/vuxml/vuln.xml29
3 files changed, 32 insertions, 3 deletions
diff --git a/security/apache-xml-security-c/Makefile b/security/apache-xml-security-c/Makefile
index eac1dde..69c4d10 100644
--- a/security/apache-xml-security-c/Makefile
+++ b/security/apache-xml-security-c/Makefile
@@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= xml-security-c
-PORTVERSION= 1.7.1
+PORTVERSION= 1.7.2
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_APACHE}
MASTER_SITE_SUBDIR=santuario/c-library
diff --git a/security/apache-xml-security-c/distinfo b/security/apache-xml-security-c/distinfo
index 4595c12..1644d7c 100644
--- a/security/apache-xml-security-c/distinfo
+++ b/security/apache-xml-security-c/distinfo
@@ -1,2 +1,2 @@
-SHA256 (xml-security-c-1.7.1.tar.gz) = 3d306660702d620b30605627f970b90667ed967211a8fc26b3243e6d3abeb32e
-SIZE (xml-security-c-1.7.1.tar.gz) = 875367
+SHA256 (xml-security-c-1.7.2.tar.gz) = d576b07bb843eaebfde3be01301db40504ea8e8e477c0ad5f739b07022445452
+SIZE (xml-security-c-1.7.2.tar.gz) = 875465
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 0e5f119..90769a4 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="81da673e-dfe1-11e2-9389-08002798f6ff">
+ <topic>apache-xml-security-c -- heap overflow during XPointer evaluation</topic>
+ <affects>
+ <package>
+ <name>apache-xml-security-c</name>
+ <range><lt>1.7.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Apache Software Foundation reports:</p>
+ <blockquote cite="http://santuario.apache.org/secadv.data/CVE-2013-2210.txt">
+ <p>The attempted fix to address CVE-2013-2154 introduced the
+ possibility of a heap overflow, possibly leading to arbitrary code
+ execution, in the processing of malformed XPointer expressions in the
+ XML Signature Reference processing code.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-2210</cvename>
+ <url>http://santuario.apache.org/secadv.data/CVE-2013-2210.txt</url>
+ </references>
+ <dates>
+ <discovery>2013-06-27</discovery>
+ <entry>2013-06-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b3fcb387-de4b-11e2-b1c6-0025905a4771">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>
OpenPOWER on IntegriCloud