Date: Thu, 15 Feb 2024 12:55:58 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 277067] security/vuxml: Add VuXML entry for 2 vulnerabilities for nginx versions 1.25.0-1.25.3 Message-ID: <bug-277067-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D277067 Bug ID: 277067 Summary: security/vuxml: Add VuXML entry for 2 vulnerabilities for nginx versions 1.25.0-1.25.3 Product: Ports & Packages Version: Latest Hardware: Any URL: https://mailman.nginx.org/pipermail/nginx-announce/202 4/NW6MNW34VZ6HDIHH5YFBIJYZJN7FGNAV.html OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: ports-secteam@FreeBSD.org Reporter: ps.ports@smyrak.com CC: osa@FreeBSD.org CC: Flags: maintainer-feedback?(ports-secteam@FreeBSD.org) Assignee: ports-secteam@FreeBSD.org Created attachment 248479 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D248479&action= =3Dedit vuln/2024.xml patch nginx team announced 2 vulnerabilities: CVE-2024-24989, CVE-2024-24990 The patch adds and entry into VuXML database for them. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-277067-7788>