1
0
mirror of https://git.FreeBSD.org/ports.git synced 2025-01-14 07:43:06 +00:00

Security update for apache-xml-security-c

URL:	http://santuario.apache.org/secadv.data/CVE-2013-2210.txt
Security:	81da673e-dfe1-11e2-9389-08002798f6ff
Security:	CVE-2013-2210
This commit is contained in:
Palle Girgensohn 2013-06-28 11:07:48 +00:00
parent a50609f354
commit 0ae6f0998d
Notes: svn2git 2021-03-31 03:12:20 +00:00
svn path=/head/; revision=321955
3 changed files with 32 additions and 3 deletions

View File

@ -2,7 +2,7 @@
# $FreeBSD$
PORTNAME= xml-security-c
PORTVERSION= 1.7.1
PORTVERSION= 1.7.2
CATEGORIES= security
MASTER_SITES= ${MASTER_SITE_APACHE}
MASTER_SITE_SUBDIR=santuario/c-library

View File

@ -1,2 +1,2 @@
SHA256 (xml-security-c-1.7.1.tar.gz) = 3d306660702d620b30605627f970b90667ed967211a8fc26b3243e6d3abeb32e
SIZE (xml-security-c-1.7.1.tar.gz) = 875367
SHA256 (xml-security-c-1.7.2.tar.gz) = d576b07bb843eaebfde3be01301db40504ea8e8e477c0ad5f739b07022445452
SIZE (xml-security-c-1.7.2.tar.gz) = 875465

View File

@ -51,6 +51,35 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
<vuln vid="81da673e-dfe1-11e2-9389-08002798f6ff">
<topic>apache-xml-security-c -- heap overflow during XPointer evaluation</topic>
<affects>
<package>
<name>apache-xml-security-c</name>
<range><lt>1.7.2</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The Apache Software Foundation reports:</p>
<blockquote cite="http://santuario.apache.org/secadv.data/CVE-2013-2210.txt">
<p>The attempted fix to address CVE-2013-2154 introduced the
possibility of a heap overflow, possibly leading to arbitrary code
execution, in the processing of malformed XPointer expressions in the
XML Signature Reference processing code.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2013-2210</cvename>
<url>http://santuario.apache.org/secadv.data/CVE-2013-2210.txt</url>
</references>
<dates>
<discovery>2013-06-27</discovery>
<entry>2013-06-28</entry>
</dates>
</vuln>
<vuln vid="b3fcb387-de4b-11e2-b1c6-0025905a4771">
<topic>mozilla -- multiple vulnerabilities</topic>
<affects>