aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authoradridg <adridg@FreeBSD.org>2018-09-11 18:39:05 +0800
committeradridg <adridg@FreeBSD.org>2018-09-11 18:39:05 +0800
commitfcd1ab0d8aabd3a26e12f2b008f91d772b5bf3d1 (patch)
tree27d4aa22e35d2d102b345f1f12456230ed1c5eb6 /security
parentb8f2e2f183717b6321e90df0a0aaedfe3ff56ad3 (diff)
downloadfreebsd-ports-gnome-fcd1ab0d8aabd3a26e12f2b008f91d772b5bf3d1.tar.gz
freebsd-ports-gnome-fcd1ab0d8aabd3a26e12f2b008f91d772b5bf3d1.tar.zst
freebsd-ports-gnome-fcd1ab0d8aabd3a26e12f2b008f91d772b5bf3d1.zip
The 0.18 release of x11/sddm contains a fix for a security error
that allows unlocking a session without a password, if the ReuseSession configuration option is set to true. The default configuration sets it to false. I'm setting the version to < 0.17.0_1 here, because I'm going to update 0.17 with backports rather than pull in 0.18 (there's a lot more work in that update, because of reorganisation upstream and none of our patches apply anymore). PR: 230029 Reported by: doctorwhoguy@gmail.com
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml27
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index f3bf8d142b9c..33e3903c8f92 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,33 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f00acdec-b59f-11e8-805d-001e2a3f778d">
+ <topic>X11 Session -- SDDM allows unauthorised unlocking</topic>
+ <affects>
+ <package>
+ <name>sddm</name>
+ <range><lt>0.17.0_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>MITRE reports:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2018-14345">
+ <p>An issue was discovered in SDDM through 0.17.0. If configured with ReuseSession=true, the password is not checked for users with an already existing session. Any user with access to the system D-Bus can therefore unlock any graphical session.</p>
+ </blockquote>
+ <p>The default configuration of SDDM on FreeBSD is not affected, since it has ReuseSession=false.</p>
+ </body>
+ </description>
+ <references>
+ <url>https://www.suse.com/security/cve/CVE-2018-14345/</url>
+ <cvename>CVE-2018-14345</cvename>
+ </references>
+ <dates>
+ <discovery>2018-08-13</discovery>
+ <entry>2018-09-11</entry>
+ </dates>
+ </vuln>
+
<vuln vid="db2acdac-b5a7-11e8-8f6f-00e04c1ea73d">
<topic>mybb -- vulnerabilities</topic>
<affects>