From owner-svn-ports-all@FreeBSD.ORG Sun Mar 23 02:48:58 2014 Return-Path: Delivered-To: svn-ports-all@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id F0ED0D2A; Sun, 23 Mar 2014 02:48:58 +0000 (UTC) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id C4C002D3; Sun, 23 Mar 2014 02:48:58 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.8/8.14.8) with ESMTP id s2N2mwlO046175; Sun, 23 Mar 2014 02:48:58 GMT (envelope-from osa@svn.freebsd.org) Received: (from osa@localhost) by svn.freebsd.org (8.14.8/8.14.8/Submit) id s2N2mw4B046174; Sun, 23 Mar 2014 02:48:58 GMT (envelope-from osa@svn.freebsd.org) Message-Id: <201403230248.s2N2mw4B046174@svn.freebsd.org> From: "Sergey A. Osokin" Date: Sun, 23 Mar 2014 02:48:58 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r348828 - head/security/vuxml X-SVN-Group: ports-head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 23 Mar 2014 02:48:59 -0000 Author: osa Date: Sun Mar 23 02:48:58 2014 New Revision: 348828 URL: http://svnweb.freebsd.org/changeset/ports/348828 QAT: https://qat.redports.org/buildarchive/r348828/ Log: Add CVE-2014-0133 entries for www/nginx and www/nginx-devel. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Sun Mar 23 02:35:12 2014 (r348827) +++ head/security/vuxml/vuln.xml Sun Mar 23 02:48:58 2014 (r348828) @@ -51,6 +51,44 @@ Note: Please add new entries to the beg --> + + nginx -- SPDY heap buffer overflow + + + nginx + nginx-devel + 1.4.7 + 1.5.12 + + + + +

The nginx project reports:

+
+

A bug in the experimental SPDY implementation in nginx was found, which + might allow an attacker to cause a heap memory buffer overflow in a + worker process by using a specially crafted request, potentially + resulting in arbitrary code execution (CVE-2014-0133).

+ +

The problem affects nginx 1.3.15 - 1.5.11, compiled with the + ngx_http_spdy_module module (which is not compiled by default) and + without --with-debug configure option, if the "spdy" option of the + "listen" directive is used in a configuration file.

+ +

The problem is fixed in nginx 1.5.12, 1.4.7.

+
+ +
+ + CVE-2014-0133 + http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html + + + 2014-03-18 + 2014-03-18 + +
+ apache -- several vulnerabilities