Date: Thu, 26 Feb 2015 01:12:45 +0000 (UTC) From: Cy Schubert <cy@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r379968 - head/security/vuxml Message-ID: <201502260112.t1Q1Cj1w049117@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: cy Date: Thu Feb 26 01:12:44 2015 New Revision: 379968 URL: https://svnweb.freebsd.org/changeset/ports/379968 QAT: https://qat.redports.org/buildarchive/r379968/ Log: Document bugs fixed in krb5 1.11.6. * Handle certain invalid RFC 1964 GSS tokens correctly to avoid invalid memory reference vulnerabilities. [CVE-2014-4341 CVE-2014-4342] * Fix memory management vulnerabilities in GSSAPI SPNEGO. [CVE-2014-4343 CVE-2014-4344] * Fix buffer overflow vulnerability in LDAP KDB back end. [CVE-2014-4345] * Fix multiple vulnerabilities in the LDAP KDC back end. [CVE-2014-5354 CVE-2014-5353] * Fix multiple kadmind vulnerabilities, some of which are based in the gssrpc library. [CVE-2014-5352 CVE-2014-9421 CVE-2014-9422 CVE-2014-9423] Security: CVE-2014-4341, CVE-2014-4342, CVE-2014-4343, CVE-2014-4344 CVE-2014-4345, CVE-2014-5354, CVE-2014-5353, CVE-2014-5352 CVE-2014-9421, CVE-2014-9422, CVE-2014-9423 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Feb 26 00:41:58 2015 (r379967) +++ head/security/vuxml/vuln.xml Thu Feb 26 01:12:44 2015 (r379968) @@ -57,6 +57,41 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="dbf9e66c-bd50-11e4-a7ba-206a8a720317"> + <topic>krb5 1.11 -- New release/fix multiple vulnerabilities</topic> + <affects> + <package> + <name>krb5-111</name> + <range><lt>1.11.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The MIT Kerberos team announces the availability of MIT Kerberos 5 Release 1.11.6:</p> + <blockquote cite="http://web.mit.edu/kerberos/krb5-1.11/README-1.11.6.txt"> + <p>Handle certain invalid RFC 1964 GSS tokens correctly to avoid + invalid memory reference vulnerabilities. [CVE-2014-4341</p> + <p>Fix memory management vulnerabilities in GSSAPI SPNEGO. + [CVE-2014-4343 CVE-2014-4344]</p> + <p>Fix buffer overflow vulnerability in LDAP KDB back end. + [CVE-2014-4345]</p> + <p>Fix multiple vulnerabilities in the LDAP KDC back end. + [CVE-2014-5354 CVE-2014-5353]</p> + <p>Fix multiple kadmind vulnerabilities, some of which are based + in the gssrpc library. [CVE-2014-5352 CVE-2014-9421 + CVE-2014-9422 CVE-2014-9423]</p> + </blockquote> + </body> + </description> + <references> + <url>http://web.mit.edu/kerberos/krb5-1.11/README-1.11.6.txt</url> + </references> + <dates> + <discovery>2015-02-25</discovery> + <entry>2015-02-25</entry> + </dates> + </vuln> + <vuln vid="996c219c-bbb1-11e4-88ae-d050992ecde8"> <topic>samba -- Unexpected code execution in smbd</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201502260112.t1Q1Cj1w049117>