From owner-svn-ports-head@freebsd.org Wed Oct 18 14:22:00 2017 Return-Path: Delivered-To: svn-ports-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 0883FE3A374; Wed, 18 Oct 2017 14:22:00 +0000 (UTC) (envelope-from woodsb02@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id C78DB7F5FD; Wed, 18 Oct 2017 14:21:59 +0000 (UTC) (envelope-from woodsb02@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id v9IELw1M076533; Wed, 18 Oct 2017 14:21:58 GMT (envelope-from woodsb02@FreeBSD.org) Received: (from woodsb02@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id v9IELwc2076530; Wed, 18 Oct 2017 14:21:58 GMT (envelope-from woodsb02@FreeBSD.org) Message-Id: <201710181421.v9IELwc2076530@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: woodsb02 set sender to woodsb02@FreeBSD.org using -f From: Ben Woods Date: Wed, 18 Oct 2017 14:21:58 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r452336 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: woodsb02 X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 452336 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-head@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the ports tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 18 Oct 2017 14:22:00 -0000 Author: woodsb02 Date: Wed Oct 18 14:21:58 2017 New Revision: 452336 URL: https://svnweb.freebsd.org/changeset/ports/452336 Log: Fix formatting (line length) in recent krb5 vulnerability entry Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Wed Oct 18 14:17:39 2017 (r452335) +++ head/security/vuxml/vuln.xml Wed Oct 18 14:21:58 2017 (r452336) @@ -72,12 +72,23 @@ Notes:

MIT reports:

CVE-2017-11368:

-

In MIT krb5 1.7 and later, an authenticated attacker can cause an assertion failure in krb5kdc by sending an invalid S4U2Self or S4U2Proxy request.

+

In MIT krb5 1.7 and later, an authenticated attacker can cause an + assertion failure in krb5kdc by sending an invalid S4U2Self or + S4U2Proxy request.

CVE-2017-11462:

-

RFC 2744 permits a GSS-API implementation to delete an existing security context on a second or subsequent call to gss_init_sec_context() or gss_accept_sec_context() if the call results in an error. This API behavior has been found to be dangerous, leading to the possibility of memory errors in some callers. For safety, GSS-API implementations should instead preserve existing security contexts on error until the caller deletes them.

-

All versions of MIT krb5 prior to this change may delete acceptor contexts on error. Versions 1.13.4 through 1.13.7, 1.14.1 through 1.14.5, and 1.15 through 1.15.1 may also delete initiator contexts on error.

+

RFC 2744 permits a GSS-API implementation to delete an existing + security context on a second or subsequent call to gss_init_sec_context() + or gss_accept_sec_context() if the call results in an error. + This API behavior has been found to be dangerous, leading to the + possibility of memory errors in some callers. For safety, GSS-API + implementations should instead preserve existing security contexts + on error until the caller deletes them.

+

All versions of MIT krb5 prior to this change may delete acceptor + contexts on error. Versions 1.13.4 through 1.13.7, 1.14.1 through + 1.14.5, and 1.15 through 1.15.1 may also delete initiator contexts + on error.