aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml
diff options
context:
space:
mode:
authorJochen Neumeister <joneum@FreeBSD.org>2019-08-17 11:07:33 +0000
committerJochen Neumeister <joneum@FreeBSD.org>2019-08-17 11:07:33 +0000
commitf44b7dd6fb3d13e61f15591350f1dfba89cfb5ae (patch)
tree1803a37b55355da35e5f85efbe2258551295ccf0 /security/vuxml
parent67540693d8f53503c97df37d00a19baee2621215 (diff)
downloadports-f44b7dd6fb3d13e61f15591350f1dfba89cfb5ae.tar.gz
ports-f44b7dd6fb3d13e61f15591350f1dfba89cfb5ae.zip
Notes
Diffstat (limited to 'security/vuxml')
-rw-r--r--security/vuxml/vuln.xml52
1 files changed, 52 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d82ec98ebf52..25a0f393b171 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,58 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="caf545f2-c0d9-11e9-9051-4c72b94353b5">
+ <topic>Apache -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>apache24</name>
+ <range><lt>2.4.41</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SO-AND-SO reports:</p>
+ <blockquote cite="http://www.apache.org/dist/httpd/CHANGES_2.4">
+ <h1>SECURITY: CVE-2019-10081</h1>
+ <p>mod_http2: HTTP/2 very early pushes, for example configured with "H2PushResource",
+ could lead to an overwrite of memory in the pushing request's pool,
+ leading to crashes. The memory copied is that of the configured push
+ link header values, not data supplied by the client.</p>
+ <h1>SECURITY: CVE-2019-9517</h1>
+ <p>mod_http2: a malicious client could perform a DoS attack by flooding
+ a connection with requests and basically never reading responses
+ on the TCP connection. Depending on h2 worker dimensioning, it was
+ possible to block those with relatively few connections.</p>
+ <h1>SECURITY: CVE-2019-10098</h1>
+ <p>rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable
+ matches and substitutions with encoded line break characters.</p>
+ <h1>SECURITY: CVE-2019-10092</h1>
+ <p>Remove HTML-escaped URLs from canned error responses to prevent misleading
+ text/links being displayed via crafted links.</p>
+ <h1>SECURITY: CVE-2019-10097</h1>
+ <p>mod_remoteip: Fix stack buffer overflow and NULL pointer deference
+ when reading the PROXY protocol header.</p>
+ <h1>CVE-2019-10082</h1>
+ <p>mod_http2: Using fuzzed network input, the http/2 session
+ handling could be made to read memory after being freed,
+ during connection shutdown.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.apache.org/dist/httpd/CHANGES_2.4</url>
+ <cvename>CVE-2019-10081</cvename>
+ <cvename>CVE-2019-9517</cvename>
+ <cvename>CVE-2019-10098</cvename>
+ <cvename>CVE-2019-10092</cvename>
+ <cvename>CVE-2019-10082</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-14</discovery>
+ <entry>2019-08-17</entry>
+ </dates>
+ </vuln>
+
<vuln vid="121fec01-c042-11e9-a73f-b36f5969f162">
<topic>nghttp2 -- multiple vulnerabilities</topic>
<affects>