xml-security-c 1.7.2-1 source package in Debian
Changelog
xml-security-c (1.7.2-1) experimental; urgency=high * New upstream release. - The attempted fix to address CVE-2013-2154 introduced the possibility of a heap overflow, possibly leading to arbitrary code execution, in the processing of malformed XPointer expressions in the XML Signature Reference processing code. Fix that heap overflow. (Closes: #714241, CVE-2013-2210) -- Russ Allbery <email address hidden> Thu, 27 Jun 2013 13:00:54 -0700
Upload details
- Uploaded by:
- Debian Shib Team
- Uploaded to:
- Experimental
- Original maintainer:
- Debian Shib Team
- Architectures:
- any
- Section:
- libs
- Urgency:
- Very Urgent
See full publishing history Publishing
Series | Published | Component | Section |
---|
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
xml-security-c_1.7.2-1.dsc | 1.8 KiB | c22ae064be9b7b681cf4c6497ad6ef3649f24c5497d698ea9d07ac5f35a26710 |
xml-security-c_1.7.2.orig.tar.gz | 854.9 KiB | d576b07bb843eaebfde3be01301db40504ea8e8e477c0ad5f739b07022445452 |
xml-security-c_1.7.2-1.debian.tar.xz | 11.7 KiB | 50e9ce850a35457602edbaddee58b0ecccfdabee2515f1a2ecb6655752da667c |
No changes file available.