Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 15 Feb 2024 12:55:58 +0000
From:      bugzilla-noreply@freebsd.org
To:        ports-bugs@FreeBSD.org
Subject:   [Bug 277067] security/vuxml: Add VuXML entry for 2 vulnerabilities for nginx versions 1.25.0-1.25.3
Message-ID:  <bug-277067-7788@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D277067

            Bug ID: 277067
           Summary: security/vuxml: Add VuXML entry for 2 vulnerabilities
                    for nginx versions 1.25.0-1.25.3
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
               URL: https://mailman.nginx.org/pipermail/nginx-announce/202
                    4/NW6MNW34VZ6HDIHH5YFBIJYZJN7FGNAV.html
                OS: Any
            Status: New
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: ports-secteam@FreeBSD.org
          Reporter: ps.ports@smyrak.com
                CC: osa@FreeBSD.org
                CC:
             Flags: maintainer-feedback?(ports-secteam@FreeBSD.org)
          Assignee: ports-secteam@FreeBSD.org

Created attachment 248479
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D248479&action=
=3Dedit
vuln/2024.xml patch

nginx team announced 2 vulnerabilities: CVE-2024-24989, CVE-2024-24990

The patch adds and entry into VuXML database for them.

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-277067-7788>