aboutsummaryrefslogtreecommitdiffstats
path: root/security/vuxml
diff options
context:
space:
mode:
authorzi <zi@FreeBSD.org>2015-02-13 09:55:33 +0800
committerzi <zi@FreeBSD.org>2015-02-13 09:55:33 +0800
commit944ebff24a36d640fcd9ce689bbaf21051f9a388 (patch)
tree2b7d28475e98746bab0461e829991246fdaabd86 /security/vuxml
parent2c09a74a53b36028e6849acd16b89f50b7ed6136 (diff)
downloadfreebsd-ports-gnome-944ebff24a36d640fcd9ce689bbaf21051f9a388.tar.gz
freebsd-ports-gnome-944ebff24a36d640fcd9ce689bbaf21051f9a388.tar.zst
freebsd-ports-gnome-944ebff24a36d640fcd9ce689bbaf21051f9a388.zip
- Correct errors in previous commit to resolve build
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml31
1 files changed, 17 insertions, 14 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 88c2164c4241..a0942a28cd4f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -66,29 +66,31 @@ Notes:
</package>
<package>
<name>krb5-112</name>
+ <range><gt>0</gt></range>
</package>
<package>
<name>krb5-111</name>
+ <range><gt>0</gt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>SO-AND-SO reports:</p>
<blockquote cite="http://web.mit.edu/kerberos/advisories/MITKRB5-SA-2015-001.txt">
- <p>CVE-2014-5353: The krb5_ldap_get_password_policy_from_dn
- function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in
- MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP,
- allows remote authenticated users to cause a denial of service
- (daemon crash) via a successful LDAP query with no results, as
- demonstrated by using an incorrect object type for a password
- policy.</p>
- <p>CVE-2014-5354: plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in
- MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when
- the KDC uses LDAP, allows remote authenticated users to cause a
- denial of service (NULL pointer dereference and daemon crash) by
- creating a database entry for a keyless principal, as
- demonstrated by a kadmin "add_principal -nokey" or "purgekeys
- -all" command.<p>
+ <p>CVE-2014-5353: The krb5_ldap_get_password_policy_from_dn
+ function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in
+ MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP,
+ allows remote authenticated users to cause a denial of service
+ (daemon crash) via a successful LDAP query with no results, as
+ demonstrated by using an incorrect object type for a password
+ policy.</p>
+ <p>CVE-2014-5354: plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in
+ MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when
+ the KDC uses LDAP, allows remote authenticated users to cause a
+ denial of service (NULL pointer dereference and daemon crash) by
+ creating a database entry for a keyless principal, as
+ demonstrated by a kadmin "add_principal -nokey" or "purgekeys
+ -all" command.</p>
</blockquote>
</body>
</description>
@@ -101,6 +103,7 @@ Notes:
<entry>2015-02-12</entry>
</dates>
</vuln>
+
<vuln vid="54a69cf7-b2ef-11e4-b1f1-bcaec565249c">
<topic>xorg-server -- Information leak in the XkbSetGeometry request of X servers.</topic>
<affects>