git: 7e0f5d9dfdc2 - main - security/shibboleth.sp: add more information to security advisory

Palle Girgensohn girgen at FreeBSD.org
Mon Apr 26 13:31:52 UTC 2021


The branch main has been updated by girgen:

URL: https://cgit.FreeBSD.org/ports/commit/?id=7e0f5d9dfdc256ae93158afcc75292f4d42c3a93

commit 7e0f5d9dfdc256ae93158afcc75292f4d42c3a93
Author:     Palle Girgensohn <girgen at FreeBSD.org>
AuthorDate: 2021-04-26 13:30:52 +0000
Commit:     Palle Girgensohn <girgen at FreeBSD.org>
CommitDate: 2021-04-26 13:30:52 +0000

    security/shibboleth.sp: add more information to security advisory
---
 security/vuxml/vuln.xml | 32 ++++++++++++++++++++++++--------
 1 file changed, 24 insertions(+), 8 deletions(-)

diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 8acc392555d6..b919cd375816 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -77,27 +77,43 @@ Notes:
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
   <vuln vid="e4403051-a667-11eb-b9c9-6cc21735f730">
-    <topic>sbibboleth-sp -- yet undisclosed vulnerability</topic>
+    <topic>sbibboleth-sp -- denial of service vulnerability</topic>
     <affects>
       <package>
 	<name>shibboleth-sp</name>
-	<range><lt>3.2.1_1</lt></range>
+	<range>
+	  <ge>3.0.0</ge>
+	  <lt>3.2.1_1</lt>
+	</range>
       </package>
     </affects>
     <description>
       <body xmlns="http://www.w3.org/1999/xhtml">
-	<p>Shibboleth project reports:</p>
-	<blockquote cite="https://wiki.shibboleth.net/confluence/display/SP3/Home">
-	  <p>A not yet disclosed vulnerability.</p>
-	</blockquote>
+      <p>Shibboleth project reports:</p>
+      <blockquote cite="https://shibboleth.net/community/advisories/secadv_20210426.txt">
+	<p>Session recovery feature contains a null pointer deference.</p>
+	<p>
+	  The cookie-based session recovery feature added in V3.0 contains a
+	  flaw that is exploitable on systems *not* using the feature if a
+	  specially crafted cookie is supplied.
+	</p>
+	<p>
+	  This manifests as a crash in the shibd daemon/service process.
+	</p>
+	<p>
+	  Because it is very simple to trigger this condition remotely, it
+	  results in a potential denial of service condition exploitable by
+	  a remote, unauthenticated attacker.
+	</p>
+      </blockquote>
       </body>
     </description>
     <references>
-      <url>https://wiki.shibboleth.net/confluence/display/SP3/Home</url>
+      <url>https://shibboleth.net/community/advisories/secadv_20210426.txt</url>
     </references>
     <dates>
       <discovery>2021-04-23</discovery>
-      <entry>2021-04-23</entry>
+      <entry>2021-04-26</entry>
     </dates>
   </vuln>
 


More information about the dev-commits-ports-all mailing list