Date: Thu, 30 Apr 2026 17:19:47 -0700 From: Cy Schubert <Cy.Schubert@cschubert.com> To: Cy Schubert <cy@FreeBSD.org> Cc: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-main@FreeBSD.org Subject: Re: git: c9dd7bffa58c - main - krb5: Fix two NegoEx parsing vulnerabilities Message-ID: <20260501001947.72C5D28D@slippy.cwsent.com> In-Reply-To: <69f3efba.307f2.6f425dba@gitrepo.freebsd.org>
index | next in thread | previous in thread | raw e-mail
In message <69f3efba.307f2.6f425dba@gitrepo.freebsd.org>, Cy Schubert writes: > The branch main has been updated by cy: > > URL: https://cgit.FreeBSD.org/src/commit/?id=c9dd7bffa58c50b2f7ed9e66ace39197 > c468d8e6 > > commit c9dd7bffa58c50b2f7ed9e66ace39197c468d8e6 > Author: Cy Schubert <cy@FreeBSD.org> > AuthorDate: 2026-04-30 19:27:31 +0000 > Commit: Cy Schubert <cy@FreeBSD.org> > CommitDate: 2026-05-01 00:11:25 +0000 > > krb5: Fix two NegoEx parsing vulnerabilities > > Bring in upstream commit 2e75f0d93 fixing two CVEs. Upstream commit > log is: > > In parse_nego_message(), check the result of the second call to > vector_base() before dereferencing it. In parse_message(), check for > a short header_len to prevent an integer underflow when calculating > the remaining message length. > > Reported by Cem Onat Karagun. > > CVE-2026-40355: > > In MIT krb5 release 1.18 and later, if an application calls > gss_accept_sec_context() on a system with a NegoEx mechanism > registered in /etc/gss/mech, an unauthenticated remote attacker can > trigger a null pointer dereference, causing the process to terminate. > > CVE-2026-40356: > > In MIT krb5 release 1.18 and later, if an application calls > gss_accept_sec_context() on a system with a NegoEx mechanism > registered in /etc/gss/mech, an unauthenticated remote attacker can > trigger a read overrun of up to 52 bytes, possibly causing the process > to terminate. Exfiltration of the bytes read does not appear > possible. > --- FreeBSD is not vulnerable to this Microsoft NegoEx extension. But it is a good idea include this anyway. Though it is still good to include this patch. I was notified about this at $JOB. -- Cheers, Cy Schubert <Cy.Schubert@cschubert.com> FreeBSD UNIX: <cy@FreeBSD.org> Web: https://FreeBSD.org NTP: <cy@nwtime.org> Web: https://nwtime.org e**(i*pi)+1=0home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20260501001947.72C5D28D>
