From owner-svn-ports-head@FreeBSD.ORG Thu Feb 26 01:12:45 2015 Return-Path: Delivered-To: svn-ports-head@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id A3EA199F; Thu, 26 Feb 2015 01:12:45 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 7527D8C8; Thu, 26 Feb 2015 01:12:45 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.9/8.14.9) with ESMTP id t1Q1Cj1L049118; Thu, 26 Feb 2015 01:12:45 GMT (envelope-from cy@FreeBSD.org) Received: (from cy@localhost) by svn.freebsd.org (8.14.9/8.14.9/Submit) id t1Q1Cj1w049117; Thu, 26 Feb 2015 01:12:45 GMT (envelope-from cy@FreeBSD.org) Message-Id: <201502260112.t1Q1Cj1w049117@svn.freebsd.org> X-Authentication-Warning: svn.freebsd.org: cy set sender to cy@FreeBSD.org using -f From: Cy Schubert Date: Thu, 26 Feb 2015 01:12:45 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r379968 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 26 Feb 2015 01:12:45 -0000 Author: cy Date: Thu Feb 26 01:12:44 2015 New Revision: 379968 URL: https://svnweb.freebsd.org/changeset/ports/379968 QAT: https://qat.redports.org/buildarchive/r379968/ Log: Document bugs fixed in krb5 1.11.6. * Handle certain invalid RFC 1964 GSS tokens correctly to avoid invalid memory reference vulnerabilities. [CVE-2014-4341 CVE-2014-4342] * Fix memory management vulnerabilities in GSSAPI SPNEGO. [CVE-2014-4343 CVE-2014-4344] * Fix buffer overflow vulnerability in LDAP KDB back end. [CVE-2014-4345] * Fix multiple vulnerabilities in the LDAP KDC back end. [CVE-2014-5354 CVE-2014-5353] * Fix multiple kadmind vulnerabilities, some of which are based in the gssrpc library. [CVE-2014-5352 CVE-2014-9421 CVE-2014-9422 CVE-2014-9423] Security: CVE-2014-4341, CVE-2014-4342, CVE-2014-4343, CVE-2014-4344 CVE-2014-4345, CVE-2014-5354, CVE-2014-5353, CVE-2014-5352 CVE-2014-9421, CVE-2014-9422, CVE-2014-9423 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Feb 26 00:41:58 2015 (r379967) +++ head/security/vuxml/vuln.xml Thu Feb 26 01:12:44 2015 (r379968) @@ -57,6 +57,41 @@ Notes: --> + + krb5 1.11 -- New release/fix multiple vulnerabilities + + + krb5-111 + 1.11.6 + + + + +

The MIT Kerberos team announces the availability of MIT Kerberos 5 Release 1.11.6:

+
+

Handle certain invalid RFC 1964 GSS tokens correctly to avoid + invalid memory reference vulnerabilities. [CVE-2014-4341

+

Fix memory management vulnerabilities in GSSAPI SPNEGO. + [CVE-2014-4343 CVE-2014-4344]

+

Fix buffer overflow vulnerability in LDAP KDB back end. + [CVE-2014-4345]

+

Fix multiple vulnerabilities in the LDAP KDC back end. + [CVE-2014-5354 CVE-2014-5353]

+

Fix multiple kadmind vulnerabilities, some of which are based + in the gssrpc library. [CVE-2014-5352 CVE-2014-9421 + CVE-2014-9422 CVE-2014-9423]

+
+ +
+ + http://web.mit.edu/kerberos/krb5-1.11/README-1.11.6.txt + + + 2015-02-25 + 2015-02-25 + +
+ samba -- Unexpected code execution in smbd