git: 21c77e23be74 - main - security/vuxml: document unit* vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 03 Mar 2025 18:25:54 UTC
The branch main has been updated by osa: URL: https://cgit.FreeBSD.org/ports/commit/?id=21c77e23be74bbedf445904a1633f9382bf00a81 commit 21c77e23be74bbedf445904a1633f9382bf00a81 Author: Sergey A. Osokin <osa@FreeBSD.org> AuthorDate: 2025-03-03 18:21:59 +0000 Commit: Sergey A. Osokin <osa@FreeBSD.org> CommitDate: 2025-03-03 18:25:47 +0000 security/vuxml: document unit* vulnerabilities --- security/vuxml/vuln/2025.xml | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index 86433409c8e4..02b7a2b1255e 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,39 @@ + <vuln vid="6af5e3a3-f85a-11ef-95b9-589cfc10a551"> + <topic>unit -- potential security issue</topic> + <affects> + <package> + <name>unit</name> + <name>unit-java</name> + <range><ge>1.11.0</ge><lt>1.34.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>SO-AND-SO reports:</p> + <blockquote cite="https://mailman.nginx.org/pipermail/unit/2025-March/QVYLJKLBIDWOJ7OLYGT27VUWH7RGBRQM.html"> + <p>Unit 1.34.2 fixes two issues in the Java language module websocket code.</p> + <ol> + <li>It addresses a potential security issue where we could get a negative + payload length that could cause the Java language module process(es) to + enter an infinite loop and consume excess CPU. This was a bug carried + over from the initial Java websocket code import. It has been re-issued + a CVE number (CVE-2025-1695).</li> + <li>It addresses an issue whereby decoded payload lengths would be limited + to 32 bits.</li> + </ol> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-1695</cvename> + <url>https://mailman.nginx.org/pipermail/unit/2025-March/QVYLJKLBIDWOJ7OLYGT27VUWH7RGBRQM.html</url> + </references> + <dates> + <discovery>2025-03-03</discovery> + <entry>2025-03-03</entry> + </dates> + </vuln> + <vuln vid="398d1ec1-f7e6-11ef-bb15-002590af0794"> <topic>vim -- Potential code execution</topic> <affects>