Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 26 Feb 2015 01:12:45 +0000 (UTC)
From:      Cy Schubert <cy@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r379968 - head/security/vuxml
Message-ID:  <201502260112.t1Q1Cj1w049117@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: cy
Date: Thu Feb 26 01:12:44 2015
New Revision: 379968
URL: https://svnweb.freebsd.org/changeset/ports/379968
QAT: https://qat.redports.org/buildarchive/r379968/

Log:
  Document bugs fixed in krb5 1.11.6.
  
  * Handle certain invalid RFC 1964 GSS tokens correctly to avoid
    invalid memory reference vulnerabilities.  [CVE-2014-4341
    CVE-2014-4342]
  
  * Fix memory management vulnerabilities in GSSAPI SPNEGO.
    [CVE-2014-4343 CVE-2014-4344]
  
  * Fix buffer overflow vulnerability in LDAP KDB back end.
    [CVE-2014-4345]
  
  * Fix multiple vulnerabilities in the LDAP KDC back end.
    [CVE-2014-5354 CVE-2014-5353]
  
  * Fix multiple kadmind vulnerabilities, some of which are based in the
    gssrpc library. [CVE-2014-5352 CVE-2014-9421 CVE-2014-9422
    CVE-2014-9423]
  
  Security:	CVE-2014-4341, CVE-2014-4342, CVE-2014-4343, CVE-2014-4344
  		CVE-2014-4345, CVE-2014-5354, CVE-2014-5353, CVE-2014-5352
  		CVE-2014-9421, CVE-2014-9422, CVE-2014-9423

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Feb 26 00:41:58 2015	(r379967)
+++ head/security/vuxml/vuln.xml	Thu Feb 26 01:12:44 2015	(r379968)
@@ -57,6 +57,41 @@ Notes:
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="dbf9e66c-bd50-11e4-a7ba-206a8a720317">
+    <topic>krb5 1.11 -- New release/fix multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>krb5-111</name>
+	<range><lt>1.11.6</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>The MIT Kerberos team announces the availability of MIT Kerberos 5 Release 1.11.6:</p>
+	<blockquote cite="http://web.mit.edu/kerberos/krb5-1.11/README-1.11.6.txt">;
+	  <p>Handle certain invalid RFC 1964 GSS tokens correctly to avoid
+	     invalid memory reference vulnerabilities.  [CVE-2014-4341</p>
+	  <p>Fix memory management vulnerabilities in GSSAPI SPNEGO.
+	     [CVE-2014-4343 CVE-2014-4344]</p>
+	  <p>Fix buffer overflow vulnerability in LDAP KDB back end.
+	     [CVE-2014-4345]</p>
+	  <p>Fix multiple vulnerabilities in the LDAP KDC back end.
+	     [CVE-2014-5354 CVE-2014-5353]</p>
+	  <p>Fix multiple kadmind vulnerabilities, some of which are based
+	     in the gssrpc library. [CVE-2014-5352 CVE-2014-9421
+	     CVE-2014-9422 CVE-2014-9423]</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://web.mit.edu/kerberos/krb5-1.11/README-1.11.6.txt</url>;
+    </references>
+    <dates>
+      <discovery>2015-02-25</discovery>
+      <entry>2015-02-25</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="996c219c-bbb1-11e4-88ae-d050992ecde8">
     <topic>samba -- Unexpected code execution in smbd</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201502260112.t1Q1Cj1w049117>