aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorzeising <zeising@FreeBSD.org>2019-03-22 12:08:55 +0800
committerzeising <zeising@FreeBSD.org>2019-03-22 12:08:55 +0800
commitee81885cf13763e52e9f9357dcc291e62b61682c (patch)
tree8be00ad5179848a99da590d3d7da00d2808c4906 /security
parent5768c6c71e6050bbdfe03ee12c44a8f511b2a113 (diff)
downloadfreebsd-ports-gnome-ee81885cf13763e52e9f9357dcc291e62b61682c.tar.gz
freebsd-ports-gnome-ee81885cf13763e52e9f9357dcc291e62b61682c.tar.zst
freebsd-ports-gnome-ee81885cf13763e52e9f9357dcc291e62b61682c.zip
Update the libXdmcp entry to make it clearer.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml6
1 files changed, 4 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 6d4957094a92..7f30d5b1ef3c 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -132,8 +132,9 @@ Notes:
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The freedesktop and x.org project reports:</p>
<blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">
- <p>It was discovered that libXdmcp before 1.1.3 including used weak
- entropy to generate session keys. On a multi-user system using
+ <p>It was discovered that libXdmcp before 1.1.3 used weak
+ entropy to generate session keys on platforms without
+ arc4random_buf() but with getentropy(). On a multi-user system using
xdmcp, a local attacker could potentially use information available
from the process list to brute force the key, allowing them to
hijack other users' sessions.</p>
@@ -150,6 +151,7 @@ Notes:
<dates>
<discovery>2017-04-04</discovery>
<entry>2019-03-21</entry>
+ <modified>2019-03-22</modified>
</dates>
</vuln>