From owner-svn-ports-head@freebsd.org Wed Jul 13 01:26:48 2016 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 31897B93264; Wed, 13 Jul 2016 01:26:48 +0000 (UTC) (envelope-from timur@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id DC07E1BE0; Wed, 13 Jul 2016 01:26:47 +0000 (UTC) (envelope-from timur@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id u6D1Ql11006794; Wed, 13 Jul 2016 01:26:47 GMT (envelope-from timur@FreeBSD.org) Received: (from timur@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id u6D1QkQb006793; Wed, 13 Jul 2016 01:26:46 GMT (envelope-from timur@FreeBSD.org) Message-Id: <201607130126.u6D1QkQb006793@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: timur set sender to timur@FreeBSD.org using -f From: "Timur I. Bakeyev" Date: Wed, 13 Jul 2016 01:26:46 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r418454 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 Jul 2016 01:26:48 -0000 Author: timur Date: Wed Jul 13 01:26:46 2016 New Revision: 418454 URL: https://svnweb.freebsd.org/changeset/ports/418454 Log: Add information about CVE-2016-2119 vulnerability in Samba suits. Security: CVE-2016-2119 Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Jul 13 00:48:28 2016 (r418453) +++ head/security/vuxml/vuln.xml Wed Jul 13 01:26:46 2016 (r418454) @@ -58,6 +58,49 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + samba -- client side SMB2/3 required signing can be downgraded + + + samba4 + 4.0.04.0.26 + + + samba41 + 4.1.04.1.23 + + + samba42 + 4.2.04.2.14 + + + samba43 + 4.3.04.3.11 + + + samba44 + 4.4.04.4.5 + + + + +

Samba team reports:

+
+

A man in the middle attack can disable client signing over + SMB2/3, even if enforced by configuration parameters.

+
+ +
+ + CVE-2016-2119 + https://www.samba.org/samba/security/CVE-2016-2119.html + + + 2016-07-07 + 2016-07-13 + +
+ ruby-saml -- XML signature wrapping attack