From owner-svn-ports-all@FreeBSD.ORG Tue May 13 01:49:52 2014 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 9E9A92FC; Tue, 13 May 2014 01:49:52 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 722922C70; Tue, 13 May 2014 01:49:52 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s4D1nqko079730; Tue, 13 May 2014 01:49:52 GMT (envelope-from knu@svn.freebsd.org) Received: (from knu@localhost) by svn.freebsd.org (8.14.8/8.14.8/Submit) id s4D1nq49079729; Tue, 13 May 2014 01:49:52 GMT (envelope-from knu@svn.freebsd.org) Message-Id: <201405130149.s4D1nq49079729@svn.freebsd.org> From: Akinori MUSHA Date: Tue, 13 May 2014 01:49:52 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r353908 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 13 May 2014 01:49:52 -0000 Author: knu Date: Tue May 13 01:49:51 2014 New Revision: 353908 URL: http://svnweb.freebsd.org/changeset/ports/353908 QAT: https://qat.redports.org/buildarchive/r353908/ Log: Document CVE-2014-0191 which affects textproc/libxml2. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue May 13 01:26:23 2014 (r353907) +++ head/security/vuxml/vuln.xml Tue May 13 01:49:51 2014 (r353908) @@ -57,6 +57,42 @@ Notes: --> + + libxml2 -- entity substituton DoS + + + libxml2 + 2.8.0_5 + + + + +

Stefan Cornelius reports:

+
+

It was discovered that libxml2, a library providing + support to read, modify and write XML files, incorrectly + performs entity substituton in the doctype prolog, even if + the application using libxml2 disabled any entity + substitution. A remote attacker could provide a + specially-crafted XML file that, when processed, would lead + to the exhaustion of CPU and memory resources or file + descriptors.

+

This issue was discovered by Daniel Berrange of Red Hat.

+
+ +
+ + CVE-2014-0191 + http://www.openwall.com/lists/oss-security/2014/05/06/4 + https://git.gnome.org/browse/libxml2/tag/?id=CVE-2014-0191 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191 + + + 2013-12-03 + 2014-05-06 + +
+ OpenSSL -- NULL pointer dereference / DoS