diff options
author | Koop Mast <kwm@FreeBSD.org> | 2014-09-17 11:04:33 +0000 |
---|---|---|
committer | Koop Mast <kwm@FreeBSD.org> | 2014-09-17 11:04:33 +0000 |
commit | 3a4a25974f870ddedd4db40a54590648720187ab (patch) | |
tree | 47c5d54d45e19d73049edd69f038ebddf8595e08 /security | |
parent | 45a53b633e8dd12490f029db549b9ca4fcb33ade (diff) | |
download | ports-3a4a25974f870ddedd4db40a54590648720187ab.tar.gz ports-3a4a25974f870ddedd4db40a54590648720187ab.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 52 |
1 files changed, 52 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index a9f40692828b..41082e2e563b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -57,6 +57,58 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="38242d51-3e58-11e4-ac2f-bcaec565249c"> + <topic>dbus -- multiple vulnabilities</topic> + <affects> + <package> + <name>dbus</name> + <range><lt>1.8.8</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Simon McVittie reports:</p> + <blockquote cite="http://lists.freedesktop.org/archives/dbus/2014-September/016343.html"> + <p>Do not accept an extra fd in the padding of a cmsg message, + which could lead to a 4-byte heap buffer overrun + (CVE-2014-3635).</p> + <p>Reduce default for maximum Unix file descriptors passed per + message from 1024 to 16, preventing a uid with the default + maximum number of connections from exhausting the system + bus' file descriptors under Linux's default rlimit + (CVE-2014-3636).</p> + <p>Disconnect connections that still have a fd pending + unmarshalling after a new configurable limit, + pending_fd_timeout (defaulting to 150 seconds), removing + the possibility of creating an abusive connection that + cannot be disconnected by setting up a circular reference + to a connection's file descriptor (CVE-2014-3637).</p> + <p>Reduce default for maximum pending replies per connection + from 8192 to 128, mitigating an algorithmic complexity + denial-of-service attack (CVE-2014-3638).</p> + <p>Reduce default for authentication timeout on the system + bus from 30 seconds to 5 seconds, avoiding denial of service + by using up all unauthenticated connection slots; and when + all unauthenticated connection slots are used up, make new + connection attempts block instead of disconnecting them + (CVE-2014-3639).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2014-3635</cvename> + <cvename>CVE-2014-3636</cvename> + <cvename>CVE-2014-3637</cvename> + <cvename>CVE-2014-3638</cvename> + <cvename>CVE-2014-3639</cvename> + <url>http://lists.freedesktop.org/archives/dbus/2014-September/016343.html</url> + </references> + <dates> + <discovery>2014-09-16</discovery> + <entry>2014-09-17</entry> + </dates> + </vuln> + <vuln vid="77b784bb-3dc6-11e4-b191-f0def16c5c1b"> <topic>nginx -- inject commands into SSL session vulnerability</topic> <affects> |