diff options
author | kwm <kwm@FreeBSD.org> | 2014-09-17 19:04:33 +0800 |
---|---|---|
committer | kwm <kwm@FreeBSD.org> | 2014-09-17 19:04:33 +0800 |
commit | 7b33cbbec085bec44d635d49e007c586975a11a6 (patch) | |
tree | 47c5d54d45e19d73049edd69f038ebddf8595e08 | |
parent | 4c7db9257f4e344647aaefbd3714e3ae4197e857 (diff) | |
download | freebsd-ports-gnome-7b33cbbec085bec44d635d49e007c586975a11a6.tar.gz freebsd-ports-gnome-7b33cbbec085bec44d635d49e007c586975a11a6.tar.zst freebsd-ports-gnome-7b33cbbec085bec44d635d49e007c586975a11a6.zip |
Document new dbus vulnabilities.
MFH: 2014Q3
-rw-r--r-- | security/vuxml/vuln.xml | 52 |
1 files changed, 52 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index a9f40692828b..41082e2e563b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -57,6 +57,58 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="38242d51-3e58-11e4-ac2f-bcaec565249c"> + <topic>dbus -- multiple vulnabilities</topic> + <affects> + <package> + <name>dbus</name> + <range><lt>1.8.8</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Simon McVittie reports:</p> + <blockquote cite="http://lists.freedesktop.org/archives/dbus/2014-September/016343.html"> + <p>Do not accept an extra fd in the padding of a cmsg message, + which could lead to a 4-byte heap buffer overrun + (CVE-2014-3635).</p> + <p>Reduce default for maximum Unix file descriptors passed per + message from 1024 to 16, preventing a uid with the default + maximum number of connections from exhausting the system + bus' file descriptors under Linux's default rlimit + (CVE-2014-3636).</p> + <p>Disconnect connections that still have a fd pending + unmarshalling after a new configurable limit, + pending_fd_timeout (defaulting to 150 seconds), removing + the possibility of creating an abusive connection that + cannot be disconnected by setting up a circular reference + to a connection's file descriptor (CVE-2014-3637).</p> + <p>Reduce default for maximum pending replies per connection + from 8192 to 128, mitigating an algorithmic complexity + denial-of-service attack (CVE-2014-3638).</p> + <p>Reduce default for authentication timeout on the system + bus from 30 seconds to 5 seconds, avoiding denial of service + by using up all unauthenticated connection slots; and when + all unauthenticated connection slots are used up, make new + connection attempts block instead of disconnecting them + (CVE-2014-3639).</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2014-3635</cvename> + <cvename>CVE-2014-3636</cvename> + <cvename>CVE-2014-3637</cvename> + <cvename>CVE-2014-3638</cvename> + <cvename>CVE-2014-3639</cvename> + <url>http://lists.freedesktop.org/archives/dbus/2014-September/016343.html</url> + </references> + <dates> + <discovery>2014-09-16</discovery> + <entry>2014-09-17</entry> + </dates> + </vuln> + <vuln vid="77b784bb-3dc6-11e4-b191-f0def16c5c1b"> <topic>nginx -- inject commands into SSL session vulnerability</topic> <affects> |