Update to 1.6.5
This is a security release by upstream, and requires configuration changes in addition to the software update. See UPDATING. Reviewed by: ports-security (zi, remko) Approved by: hrs (mentor, ports committer)
This commit is contained in:
parent
5f74a99300
commit
e3d11f460c
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=323659
4 changed files with 47 additions and 5 deletions
11
UPDATING
11
UPDATING
|
@ -5,6 +5,17 @@ they are unavoidable.
|
|||
You should get into the habit of checking this file for changes each time
|
||||
you update your ports collection, before attempting any port upgrades.
|
||||
|
||||
20130725:
|
||||
AFFECTS: users of net/openafs
|
||||
AUTHOR: bjk@FreeBSD.org
|
||||
|
||||
The OpenAFS 1.6.5 release is a security release which requires substantial
|
||||
configuration changes to the AFS servers in addition to the software update,
|
||||
in order to be fully protected. The entry for OPENAFS-SA-2013-003 on
|
||||
http://www.openafs.org/security/ has links to the upgrade documentation.
|
||||
The procedure involves rekeying the cell to a non-DES krb5 key, stored in
|
||||
a krb5 keytab named rxkad.keytab in PREFIX/etc/openafs/server/.
|
||||
|
||||
20130720:
|
||||
AFFECTS: users of japanese/mozc-server and japanese/mozc-el
|
||||
AUTHOR: hrs@FreeBSD.org
|
||||
|
|
|
@ -21,7 +21,7 @@ LICENSE_NAME= IBM Public License Version 1.0
|
|||
LICENSE_FILE= ${WRKSRC}/doc/LICENSE
|
||||
LICENSE_PERMS= auto-accept
|
||||
|
||||
AFS_DISTVERSION= 1.6.4
|
||||
AFS_DISTVERSION= 1.6.5
|
||||
DBVERSION= 2013-01-28
|
||||
|
||||
OPTIONS_DEFINE= FUSE
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
SHA256 (openafs-1.6.4-src.tar.bz2) = a724d23c0cf942e2c463487b4ce213db41ac5801c8a8d74d372d5757313224d7
|
||||
SIZE (openafs-1.6.4-src.tar.bz2) = 14562800
|
||||
SHA256 (openafs-1.6.4-doc.tar.bz2) = e0953c67dc9eee6bb4494d935e4e7ae560332405f670315ecc86c178fde2c93e
|
||||
SIZE (openafs-1.6.4-doc.tar.bz2) = 3493373
|
||||
SHA256 (openafs-1.6.5-src.tar.bz2) = 176fab2d710d8dcf566f5aa229fd796dd8165561d57590e32790a3034a195ef2
|
||||
SIZE (openafs-1.6.5-src.tar.bz2) = 14400420
|
||||
SHA256 (openafs-1.6.5-doc.tar.bz2) = 754ce1fd1c3b9026883453d5cde1705452568f4e54e86fbf02a75debf8f57f2f
|
||||
SIZE (openafs-1.6.5-doc.tar.bz2) = 3488188
|
||||
SHA256 (CellServDB.2013-01-28) = faa755c6e13d8a71182a4036d1cee01bce49fb2a93feb6499683f22049391a17
|
||||
SIZE (CellServDB.2013-01-28) = 36787
|
||||
|
|
|
@ -51,6 +51,37 @@ Note: Please add new entries to the beginning of this file.
|
|||
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="c4d412c8-f4d1-11e2-b86c-000c295229d5">
|
||||
<topic>openafs -- single-DES cell-wide key brute force vulnerability</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>openafs</name>
|
||||
<range><lt>1.6.5</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<p>OpenAFS Project reports:</p>
|
||||
<blockquote cite="http://openafs.org/pages/security/OPENAFS-SA-2013-003.txt">
|
||||
<p>The small size of the DES key space permits an attacker to brute
|
||||
force a cell's service key and then forge traffic from any user
|
||||
within the cell. The key space search can be performed in under 1
|
||||
day at a cost of around $100 using publicly available services.</p>
|
||||
</blockquote>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2013-4134</cvename>
|
||||
<url>http://openafs.org/pages/security/OPENAFS-SA-2013-003.txt</url>
|
||||
<url>http://openafs.org/pages/security/how-to-rekey.txt</url>
|
||||
<url>http://openafs.org/pages/security/install-rxkad-k5-1.6.txt</url>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2013-07-24</discovery>
|
||||
<entry>2013-07-25</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="2ae24334-f2e6-11e2-8346-001e8c75030d">
|
||||
<topic>subversion -- remotely triggerable "Assertion failed" DoS vulnerability or read overflow.</topic>
|
||||
<affects>
|
||||
|
|
Loading…
Reference in a new issue