svn commit: r414180 - head/security/vuxml
Lev A. Serebryakov
lev at FreeBSD.org
Thu Apr 28 15:15:40 UTC 2016
Author: lev
Date: Thu Apr 28 15:15:38 2016
New Revision: 414180
URL: https://svnweb.freebsd.org/changeset/ports/414180
Log:
Add two CVEs for subversion:
http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Thu Apr 28 15:10:50 2016 (r414179)
+++ head/security/vuxml/vuln.xml Thu Apr 28 15:15:38 2016 (r414180)
@@ -58,6 +58,49 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="c8174b63-0d3a-11e6-b06e-d43d7eed0ce2">
+ <topic>subversion -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>subversion</name>
+ <range><ge>1.9.0</ge><lt>1.9.4</lt></range>
+ <range><ge>1.0.0</ge><lt>1.8.15</lt></range>
+ </package>
+ <package>
+ <name>subversion18</name>
+ <range><ge>1.0.0</ge><lt>1.8.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Subversion project reports:</p>
+ <blockquote cite="http://subversion.apache.org/security/CVE-2016-2167-advisory.txt">
+ <p>svnserve, the svn:// protocol server, can optionally use the Cyrus
+ SASL library for authentication, integrity protection, and encryption.
+ Due to a programming oversight, authentication against Cyrus SASL
+ would permit the remote user to specify a realm string which is
+ a prefix of the expected realm string.</p>
+ </blockquote>
+ <blockquote cite="http://subversion.apache.org/security/CVE-2016-2168-advisory.txt">
+ <p>Subversion's httpd servers are vulnerable to a remotely triggerable crash
+ in the mod_authz_svn module. The crash can occur during an authorization
+ check for a COPY or MOVE request with a specially crafted header value.</p>
+ <p>This allows remote attackers to cause a denial of service.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-2167</cvename>
+ <url>http://subversion.apache.org/security/CVE-2016-2167-advisory.txt</url>
+ <cvename>CVE-2016-2168</cvename>
+ <url>http://subversion.apache.org/security/CVE-2016-2168-advisory.txt</url>
+ </references>
+ <dates>
+ <discovery>2016-04-21</discovery>
+ <entry>2016-04-28</entry>
+ </dates>
+ </vuln>
+
<vuln vid="b2487d9a-0c30-11e6-acd0-d050996490d0">
<topic>ntp -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-all
mailing list