From owner-svn-ports-head@FreeBSD.ORG Tue Jul 16 18:10:13 2013 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id 10B54AB7; Tue, 16 Jul 2013 18:10:13 +0000 (UTC) (envelope-from des@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id DDAC595B; Tue, 16 Jul 2013 18:10:12 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.7/8.14.7) with ESMTP id r6GIACIo039146; Tue, 16 Jul 2013 18:10:12 GMT (envelope-from des@svn.freebsd.org) Received: (from des@localhost) by svn.freebsd.org (8.14.7/8.14.5/Submit) id r6GIACqC039145; Tue, 16 Jul 2013 18:10:12 GMT (envelope-from des@svn.freebsd.org) Message-Id: <201307161810.r6GIACqC039145@svn.freebsd.org> From: Dag-Erling Smørgrav Date: Tue, 16 Jul 2013 18:10:12 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r323118 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Jul 2013 18:10:13 -0000 Author: des Date: Tue Jul 16 18:10:12 2013 New Revision: 323118 URL: http://svnweb.freebsd.org/changeset/ports/323118 Log: Add two more PHP entries for issues which have already been fixed. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Jul 16 17:54:53 2013 (r323117) +++ head/security/vuxml/vuln.xml Tue Jul 16 18:10:12 2013 (r323118) @@ -51,6 +51,71 @@ Note: Please add new entries to the beg --> + + PHP5 -- Heap corruption in XML parser + + + php53 + 5.3.27 + + + + +

The PHP development team reports:

+
+

ext/xml/xml.c in PHP before 5.3.27 does not properly + consider parsing depth, which allows remote attackers to + cause a denial of service (heap memory corruption) or + possibly have unspecified other impact via a crafted + document that is processed by the xml_parse_into_struct + function.

+
+ +
+ + CVE-2013-4113 + https://bugs.php.net/bug.php?id=65236 + + + 2013-07-10 + 2013-07-16 + +
+ + + PHP5 -- Integer overflow in Calendar module + + + php5 + 5.4.05.4.16 + + + php53 + 5.3.26 + + + + +

The PHP development team reports:

+
+

Integer overflow in the SdnToJewish function in jewish.c + in the Calendar component in PHP before 5.3.26 and 5.4.x + before 5.4.16 allows context-dependent attackers to cause a + denial of service (application hang) via a large argument to + the jdtojewish function.

+
+ +
+ + CVE-2013-4635 + https://bugs.php.net/bug.php?id=64895 + + + 2013-05-22 + 2013-07-16 + +
+ linux-flashplugin -- multiple vulnerabilities