Date: Tue, 20 Jun 2017 07:05:15 +0000 (UTC) From: Bernard Spil <brnrd@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r443943 - head/security/vuxml Message-ID: <201706200705.v5K75FFu089661@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: brnrd Date: Tue Jun 20 07:05:14 2017 New Revision: 443943 URL: https://svnweb.freebsd.org/changeset/ports/443943 Log: security/vuxml: Document Apache httpd vulnerabilities Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Tue Jun 20 06:30:23 2017 (r443942) +++ head/security/vuxml/vuln.xml Tue Jun 20 07:05:14 2017 (r443943) @@ -58,6 +58,62 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="0c2db2aa-5584-11e7-9a7d-b499baebfeaf"> + <topic>Apache httpd -- several vulnerabilities</topic> + <affects> + <package> + <name>apache22</name> + <range><lt>2.2.32</lt></range> + </package> + <package> + <name>apache24</name> + <range><lt>2.4.26</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Apache httpd project reports:</p> + <blockquote cite="http://httpd.apache.org/security/vulnerabilities_24.html"> + <ul> + <li>ap_get_basic_auth_pw() Authentication Bypass (CVE-2017-3167):<br/> + Use of the ap_get_basic_auth_pw() by third-party modules outside + of the authentication phase may lead to authentication requirements + being bypassed.</li> + <li>mod_ssl Null Pointer Dereference (CVE-2017-3169):<br/>mod_ssl may + dereference a NULL pointer when third-party modules + call ap_hook_process_connection() during an HTTP request to an HTTPS + port.</li> + <li>mod_http2 Null Pointer Dereference (CVE-2017-7659):<br/> A maliciously + constructed HTTP/2 request could cause mod_http2 to dereference a NULL + pointer and crash the server process.</li> + <li>ap_find_token() Buffer Overread (CVE-2017-7668):<br/>The HTTP strict + parsing changes added in 2.2.32 and 2.4.24 introduced a bug in token + list parsing, which allows ap_find_token() to search past the end of its + input string. By maliciously crafting a sequence of request headers, an + attacker may be able to cause a segmentation fault, or to force + ap_find_token() to return an incorrect value.</li> + <li>mod_mime Buffer Overread (CVE-2017-7679):<br/>mod_mime can read one + byte past the end of a buffer when sending a malicious Content-Type + response header.</li> + </ul> + </blockquote> + </body> + </description> + <references> + <url>https://httpd.apache.org/security/vulnerabilities_24.html</url> + <url>https://httpd.apache.org/security/vulnerabilities_22.html</url> + <cvename>CVE-2017-3167</cvename> + <cvename>CVE-2017-3169</cvename> + <cvename>CVE-2017-7659</cvename> + <cvename>CVE-2017-7668</cvename> + <cvename>CVE-2017-7679</cvename> + </references> + <dates> + <discovery>2017-06-20</discovery> + <entry>2017-06-20</entry> + </dates> + </vuln> + <vuln vid="f53dd5cc-527f-11e7-a772-e8e0b747a45a"> <topic>chromium -- multiple vulnerabilities</topic> <affects> @@ -7090,7 +7146,7 @@ Notes: <topic>Apache httpd -- several vulnerabilities</topic> <affects> <package> - <name>apache24</name> + <name>APAche24</name> <range><lt>2.4.25</lt></range> </package> </affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201706200705.v5K75FFu089661>