git: 21c77e23be74 - main - security/vuxml: document unit* vulnerabilities
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 03 Mar 2025 18:25:54 UTC
The branch main has been updated by osa:
URL: https://cgit.FreeBSD.org/ports/commit/?id=21c77e23be74bbedf445904a1633f9382bf00a81
commit 21c77e23be74bbedf445904a1633f9382bf00a81
Author: Sergey A. Osokin <osa@FreeBSD.org>
AuthorDate: 2025-03-03 18:21:59 +0000
Commit: Sergey A. Osokin <osa@FreeBSD.org>
CommitDate: 2025-03-03 18:25:47 +0000
security/vuxml: document unit* vulnerabilities
---
security/vuxml/vuln/2025.xml | 36 ++++++++++++++++++++++++++++++++++++
1 file changed, 36 insertions(+)
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 86433409c8e4..02b7a2b1255e 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,39 @@
+ <vuln vid="6af5e3a3-f85a-11ef-95b9-589cfc10a551">
+ <topic>unit -- potential security issue</topic>
+ <affects>
+ <package>
+ <name>unit</name>
+ <name>unit-java</name>
+ <range><ge>1.11.0</ge><lt>1.34.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SO-AND-SO reports:</p>
+ <blockquote cite="https://mailman.nginx.org/pipermail/unit/2025-March/QVYLJKLBIDWOJ7OLYGT27VUWH7RGBRQM.html">
+ <p>Unit 1.34.2 fixes two issues in the Java language module websocket code.</p>
+ <ol>
+ <li>It addresses a potential security issue where we could get a negative
+ payload length that could cause the Java language module process(es) to
+ enter an infinite loop and consume excess CPU. This was a bug carried
+ over from the initial Java websocket code import. It has been re-issued
+ a CVE number (CVE-2025-1695).</li>
+ <li>It addresses an issue whereby decoded payload lengths would be limited
+ to 32 bits.</li>
+ </ol>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-1695</cvename>
+ <url>https://mailman.nginx.org/pipermail/unit/2025-March/QVYLJKLBIDWOJ7OLYGT27VUWH7RGBRQM.html</url>
+ </references>
+ <dates>
+ <discovery>2025-03-03</discovery>
+ <entry>2025-03-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="398d1ec1-f7e6-11ef-bb15-002590af0794">
<topic>vim -- Potential code execution</topic>
<affects>