Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 Jul 2016 12:25:51 +0000 (UTC)
From:      Mark Felder <feld@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r418834 - head/security/vuxml
Message-ID:  <201607201225.u6KCPp6I009089@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: feld
Date: Wed Jul 20 12:25:51 2016
New Revision: 418834
URL: https://svnweb.freebsd.org/changeset/ports/418834

Log:
  Remove HTTPoxy entry in vuxml until a we know if upstream vendors will
  patch this so things aren't marked vulnerable forever.

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Wed Jul 20 11:37:36 2016	(r418833)
+++ head/security/vuxml/vuln.xml	Wed Jul 20 12:25:51 2016	(r418834)
@@ -96,109 +96,6 @@ Notes:
     </dates>
   </vuln>
 
-  <vuln vid="cf0b5668-4d1b-11e6-b2ec-b499baebfeaf">
-    <topic>Multiple ports -- Proxy HTTP header vulnerability (httpoxy)</topic>
-    <affects>
-      <package>
-	<name>apache22</name>
-	<name>apache22-event-mpm</name>
-	<name>apache22-itk-mpm</name>
-	<name>apache22-peruser-mpm</name>
-	<name>apache22-worker-mpm</name>
-	<range><lt>2.2.31_1</lt></range>
-      </package>
-      <package>
-	<name>apache24</name>
-	<range><lt>2.4.23_1</lt></range>
-      </package>
-      <package>
-	<name>tomcat6</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>tomcat7</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>tomcat8</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>php55</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>php56</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>php70</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>nginx</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>go</name>
-	<range><lt>1.6.3</lt></range>
-      </package>
-      <package>
-	<name>go14</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>python27</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>python33</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>python34</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>python35</name>
-	<range><ge>0</ge></range>
-      </package>
-      <package>
-	<name>haproxy</name>
-	<range><ge>0</ge></range>
-      </package>
-    </affects>
-    <description>
-      <body xmlns="http://www.w3.org/1999/xhtml">;
-	<p>httpoxy.org reports:</p>
-	<blockquote cite="https://httpoxy.org/">;
-	  <p>httpoxy is a set of vulnerabilities that affect application code
-	    running in CGI, or CGI-like environments. It comes down to a simple
-	    namespace conflict:.</p>
-	  <ul><li>RFC 3875 (CGI) puts the HTTP Proxy header from a request into
-	      the environment variables as HTTP_PROXY</li>
-	    <li>HTTP_PROXY is a popular environment variable used to configure
-	      an outgoing proxy</li></ul>
-	  <p>This leads to a remotely exploitable vulnerability.</p>
-	</blockquote>
-      </body>
-    </description>
-    <references>
-      <url>https://httpoxy.org/</url>;
-      <url>https://www.kb.cert.org/vuls/id/797896</url>;
-      <url>CVE-2016-5385</url>
-      <url>CVE-2016-5386</url>
-      <url>CVE-2016-5387</url>
-      <url>CVE-2016-5388</url>
-      <url>CVE-2016-1000110</url>
-    </references>
-    <dates>
-      <discovery>2016-07-18</discovery>
-      <entry>2016-07-18</entry>
-      <modified>2016-07-19</modified>
-    </dates>
-  </vuln>
-
   <vuln vid="00cb1469-4afc-11e6-97ea-002590263bf5">
     <topic>atutor -- multiple vulnerabilites</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201607201225.u6KCPp6I009089>