aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorJason Unovitch <junovitch@FreeBSD.org>2016-03-27 01:42:42 +0000
committerJason Unovitch <junovitch@FreeBSD.org>2016-03-27 01:42:42 +0000
commit8294e9e470de4bbfeaa571a668e54d3a0cd3195e (patch)
tree61b697f1aa5a89fc46f765e48b52611908e7ce8a /security/vuxml
parent76a41387922e80b81947976ad54a2d33827e7f20 (diff)
downloadports-8294e9e470de4bbfeaa571a668e54d3a0cd3195e.tar.gz
ports-8294e9e470de4bbfeaa571a668e54d3a0cd3195e.zip
Notes
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml35
1 files changed, 35 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 61ab72aefd3e..a08a3da9627b 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,41 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="6d25c306-f3bb-11e5-92ce-002590263bf5">
+ <topic>salt -- Insecure configuration of PAM external authentication service</topic>
+ <affects>
+ <package>
+ <name>py27-salt</name>
+ <name>py32-salt</name>
+ <name>py33-salt</name>
+ <name>py34-salt</name>
+ <name>py35-salt</name>
+ <range><lt>2015.5.10</lt></range>
+ <range><ge>2015.8.0</ge><lt>2015.8.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SaltStack reports:</p>
+ <blockquote cite="https://docs.saltstack.com/en/latest/topics/releases/2015.8.8.html">
+ <p>This issue affects all Salt versions prior to 2015.8.8/2015.5.10
+ when PAM external authentication is enabled. This issue involves
+ passing an alternative PAM authentication service with a command
+ that is sent to LocalClient, enabling the attacker to bypass the
+ configured authentication service.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-3176</cvename>
+ <url>https://docs.saltstack.com/en/latest/topics/releases/2015.8.8.html</url>
+ </references>
+ <dates>
+ <discovery>2016-03-17</discovery>
+ <entry>2016-03-27</entry>
+ </dates>
+ </vuln>
+
<vuln vid="a258604d-f2aa-11e5-b4a9-ac220bdcec59">
<topic>activemq -- Unsafe deserialization</topic>
<affects>