Date: Sun, 23 Mar 2014 02:48:58 +0000 (UTC) From: "Sergey A. Osokin" <osa@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r348828 - head/security/vuxml Message-ID: <201403230248.s2N2mw4B046174@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: osa Date: Sun Mar 23 02:48:58 2014 New Revision: 348828 URL: http://svnweb.freebsd.org/changeset/ports/348828 QAT: https://qat.redports.org/buildarchive/r348828/ Log: Add CVE-2014-0133 entries for www/nginx and www/nginx-devel. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Mar 23 02:35:12 2014 (r348827) +++ head/security/vuxml/vuln.xml Sun Mar 23 02:48:58 2014 (r348828) @@ -51,6 +51,44 @@ Note: Please add new entries to the beg --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="fc28df92-b233-11e3-99ca-f0def16c5c1b"> + <topic>nginx -- SPDY heap buffer overflow</topic> + <affects> + <package> + <name>nginx</name> + <name>nginx-devel</name> + <range><lt>1.4.7</lt></range> + <range><lt>1.5.12</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The nginx project reports:</p> + <blockquote cite="http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html"> + <p>A bug in the experimental SPDY implementation in nginx was found, which + might allow an attacker to cause a heap memory buffer overflow in a + worker process by using a specially crafted request, potentially + resulting in arbitrary code execution (CVE-2014-0133).</p> + + <p>The problem affects nginx 1.3.15 - 1.5.11, compiled with the + ngx_http_spdy_module module (which is not compiled by default) and + without --with-debug configure option, if the "spdy" option of the + "listen" directive is used in a configuration file.</p> + + <p>The problem is fixed in nginx 1.5.12, 1.4.7.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2014-0133</cvename> + <url>http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html</url> + </references> + <dates> + <discovery>2014-03-18</discovery> + <entry>2014-03-18</entry> + </dates> + </vuln> + <vuln vid="91ecb546-b1e6-11e3-980f-20cf30e32f6d"> <topic>apache -- several vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403230248.s2N2mw4B046174>