Date: Thu, 16 May 2013 22:46:39 +0000 (UTC) From: Xin LI <delphij@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r318342 - head/security/vuxml Message-ID: <201305162246.r4GMkdCX048933@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: delphij Date: Thu May 16 22:46:38 2013 New Revision: 318342 URL: http://svnweb.freebsd.org/changeset/ports/318342 Log: Update the recent nginx entry to cover the exact version range and include information for CVE-2013-2070. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu May 16 22:43:05 2013 (r318341) +++ head/security/vuxml/vuln.xml Thu May 16 22:46:38 2013 (r318342) @@ -170,34 +170,45 @@ Note: Please add new entries to the beg </vuln> <vuln vid="efaa4071-b700-11e2-b1b9-f0def16c5c1b"> - <topic>nginx -- Stack-based buffer overflow</topic> + <topic>nginx -- multiple vulnerabilities</topic> <affects> <package> <name>nginx</name> - <range><ge>1.2.0,1</ge><lt>1.4.1,1</lt></range> + <range><ge>1.2.0,1</ge><le>1.2.8,1</le></range> + <range><ge>1.3.0,1</ge><lt>1.4.1,1</lt></range> </package> <package> <name>nginx-devel</name> - <range><ge>1.1.4</ge><lt>1.5.0</lt></range> + <range><ge>1.1.4</ge><le>1.2.8</le></range> + <range><ge>1.3.0</ge><lt>1.5.0</lt></range> </package> </affects> <description> <body xmlns="http://www.w3.org/1999/xhtml"> <p>The nginx project reports:</p> <blockquote cite="http://nginx.org/en/security_advisories.html"> - <p>A stack-based buffer overflow might occur in a worker process - process while handling a specially crafted request, potentially - resulting in arbitrary code execution.</p> + <p>A stack-based buffer overflow might occur in a worker process + process while handling a specially crafted request, potentially + resulting in arbitrary code execution. [CVE-2013-2028]</p> + <p>A security problem related to CVE-2013-2028 was identified, + affecting some previous nginx versions if proxy_pass to + untrusted upstream HTTP servers is used.</p> + <p>The problem may lead to a denial of service or a disclosure of a + worker process memory on a specially crafted response from an + upstream proxied server. [CVE-2013-2070]</p> </blockquote> </body> </description> <references> <cvename>CVE-2013-2028</cvename> + <cvename>CVE-2013-2070</cvename> + <url>http://mailman.nginx.org/pipermail/nginx-announce/2013/000114.html</url> + <url>http://mailman.nginx.org/pipermail/nginx-announce/2013/000112.html</url> </references> <dates> <discovery>2013-05-07</discovery> <entry>2013-05-07</entry> - <modified>2013-05-07</modified> + <modified>2013-05-16</modified> </dates> </vuln>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201305162246.r4GMkdCX048933>