Date: Mon, 26 Apr 2021 13:31:52 GMT From: Palle Girgensohn <girgen@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 7e0f5d9dfdc2 - main - security/shibboleth.sp: add more information to security advisory Message-ID: <202104261331.13QDVqDl038199@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by girgen: URL: https://cgit.FreeBSD.org/ports/commit/?id=7e0f5d9dfdc256ae93158afcc75292f4d42c3a93 commit 7e0f5d9dfdc256ae93158afcc75292f4d42c3a93 Author: Palle Girgensohn <girgen@FreeBSD.org> AuthorDate: 2021-04-26 13:30:52 +0000 Commit: Palle Girgensohn <girgen@FreeBSD.org> CommitDate: 2021-04-26 13:30:52 +0000 security/shibboleth.sp: add more information to security advisory --- security/vuxml/vuln.xml | 32 ++++++++++++++++++++++++-------- 1 file changed, 24 insertions(+), 8 deletions(-) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 8acc392555d6..b919cd375816 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -77,27 +77,43 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> <vuln vid="e4403051-a667-11eb-b9c9-6cc21735f730"> - <topic>sbibboleth-sp -- yet undisclosed vulnerability</topic> + <topic>sbibboleth-sp -- denial of service vulnerability</topic> <affects> <package> <name>shibboleth-sp</name> - <range><lt>3.2.1_1</lt></range> + <range> + <ge>3.0.0</ge> + <lt>3.2.1_1</lt> + </range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>Shibboleth project reports:</p> - <blockquote cite="https://wiki.shibboleth.net/confluence/display/SP3/Home"> - <p>A not yet disclosed vulnerability.</p> - </blockquote> + <p>Shibboleth project reports:</p> + <blockquote cite="https://shibboleth.net/community/advisories/secadv_20210426.txt"> + <p>Session recovery feature contains a null pointer deference.</p> + <p> + The cookie-based session recovery feature added in V3.0 contains a + flaw that is exploitable on systems *not* using the feature if a + specially crafted cookie is supplied. + </p> + <p> + This manifests as a crash in the shibd daemon/service process. + </p> + <p> + Because it is very simple to trigger this condition remotely, it + results in a potential denial of service condition exploitable by + a remote, unauthenticated attacker. + </p> + </blockquote> </body> </description> <references> - <url>https://wiki.shibboleth.net/confluence/display/SP3/Home</url> + <url>https://shibboleth.net/community/advisories/secadv_20210426.txt</url> </references> <dates> <discovery>2021-04-23</discovery> - <entry>2021-04-23</entry> + <entry>2021-04-26</entry> </dates> </vuln>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202104261331.13QDVqDl038199>