diff options
author | danfe <danfe@FreeBSD.org> | 2013-12-03 14:28:03 +0800 |
---|---|---|
committer | danfe <danfe@FreeBSD.org> | 2013-12-03 14:28:03 +0800 |
commit | 25dcf7c75c00d611e247031645ca1b2772037573 (patch) | |
tree | 5a29f928f94dfeefb452945b6421f24fcb0fa341 /security | |
parent | 755f3929776beef680e48767173197a11087a6fb (diff) | |
download | freebsd-ports-gnome-25dcf7c75c00d611e247031645ca1b2772037573.tar.gz freebsd-ports-gnome-25dcf7c75c00d611e247031645ca1b2772037573.tar.zst freebsd-ports-gnome-25dcf7c75c00d611e247031645ca1b2772037573.zip |
Update to version 1.3.3, which fixes an important crashy bug: denial of
service (server) using forcefully crashed aircrafts.
While here, reduce the diffs between other OpenTTD's VuXML entries; and
limit build logs verbosity to bulk package builders (or batch builds).
PR: ports/184434, ports/184435
Submitted by: Ilya A. Arkhipov
Security: CVE-2013-6411
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 37 |
1 files changed, 35 insertions, 2 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f8b2d732deeb..ffe37981f42a 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,39 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="d2073237-5b52-11e3-80f7-c86000cbc6ec"> + <topic>OpenTTD -- Denial of service using forcefully crashed aircrafts</topic> + <affects> + <package> + <name>openttd</name> + <range><ge>0.3.6</ge><lt>1.3.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The OpenTTD Team reports:</p> + <blockquote cite="https://security.openttd.org/en/CVE-2013-6411"> + <p>The problem is caused by incorrectly handling the fact that + the aircraft circling the corner airport will be outside of the + bounds of the map. In the 'out of fuel' crash code the height + of the tile under the aircraft is determined. In this case + that means a tile outside of the allocated map array, which + could occasionally trigger invalid reads.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-6411</cvename> + <url>https://security.openttd.org/en/CVE-2013-6411</url> + <url>http://bugs.openttd.org/task/5820</url> + <url>http://vcs.openttd.org/svn/changeset/26134</url> + </references> + <dates> + <discovery>2013-11-28</discovery> + <entry>2013-11-28</entry> + </dates> + </vuln> + <vuln vid="620cf713-5a99-11e3-878d-20cf30e32f6d"> <topic>monitorix -- serious bug in the built-in HTTP server</topic> <affects> @@ -12132,7 +12165,7 @@ executed in your Internet Explorer while displaying the email.</p> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>OpenTTD reports:</p> + <p>The OpenTTD Team reports:</p> <blockquote cite="http://security.openttd.org/en/CVE-2012-3436"> <p>Denial of service (server) using ships on half tiles and landscaping.</p> @@ -28394,7 +28427,7 @@ executed in your Internet Explorer while displaying the email.</p> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> - <p>OpenTTD project reports:</p> + <p>The OpenTTD Team reports:</p> <blockquote cite="http://security.openttd.org/en/CVE-2010-2534"> <p>When multiple commands are queued (at the server) for execution in the next game tick and an client joins the server can get into |