xml-security-c 1.6.1-1 source package in Debian

Changelog

xml-security-c (1.6.1-1) unstable; urgency=high
  * Urgency high for security fix.  * New upstream release.    - DSIGObject::load method crashes for ds:Object without Id attribute    - Buffer overflow when signing or verifying files with big asymmetric      keys (Closes: #632973, CVE-2011-2516)    - Memory bug inside XENCCipherImpl::deSerialise    - Function cleanURIEscapes always throws XSECException, when any      escape sequence occurs    - Function isHexDigit doesn't recognize invalid escape sequences    - Percent-encoded multibyte (UTF-8) sequences unrecognized    - RSA-OAEP handler only allows SHA-1 digests  * Update debian/watch for the new organization of Apache downloads. -- Russ Allbery <email address hidden>  Thu, 07 Jul 2011 09:10:33 -0700

Upload details

Uploaded by:
Debian Shib Team
Uploaded to:
Sid
Original maintainer:
Debian Shib Team
Architectures:
any
Section:
libs
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
xml-security-c_1.6.1-1.dsc 1.6 KiB 74c60ca69966f246e40f3a10b1f61f1b84fdd0a58f3cda0b29eb2b0e1d484575
xml-security-c_1.6.1.orig.tar.gz 844.1 KiB 73931a55d6925a82416ea48f8d6f1b8ed591368e1dfc30574fe43904b7c62fcd
xml-security-c_1.6.1-1.debian.tar.gz 7.1 KiB ae82090ad6f81811de165fb795e8b5b84285e3f4f42cc19320eb73452a47297a

No changes file available.

Binary packages built by this source