diff options
author | brnrd <brnrd@FreeBSD.org> | 2018-09-26 20:49:23 +0800 |
---|---|---|
committer | brnrd <brnrd@FreeBSD.org> | 2018-09-26 20:49:23 +0800 |
commit | 33d9c2d77098ac01e0f66a14986e47eef8b26cdb (patch) | |
tree | dfcdb555f9ccce0b75a076c43f1a132d287a82db /security | |
parent | 45050effbfee64ba17e3223cc0af5bf12cedba85 (diff) | |
download | freebsd-ports-gnome-33d9c2d77098ac01e0f66a14986e47eef8b26cdb.tar.gz freebsd-ports-gnome-33d9c2d77098ac01e0f66a14986e47eef8b26cdb.tar.zst freebsd-ports-gnome-33d9c2d77098ac01e0f66a14986e47eef8b26cdb.zip |
security/vuxml: Add Apache 2.4 vulnerability
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index c115434e3973..6d5e1057458b 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,36 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e182c076-c189-11e8-a6d2-b499baebfeaf"> + <topic>Apache -- Denial of service vulnerability in HTTP/2</topic> + <affects> + <package> + <name>apache24</name> + <range><lt>2.4.35</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Apache httpd project reports:</p> + <blockquote cite="http://httpd.apache.org/security/vulnerabilities_24.html"> + <p>low: DoS for HTTP/2 connections by continuous SETTINGS</p> + <p>By sending continous SETTINGS frames of maximum size an ongoing + HTTP/2 connection could be kept busy and would never time out. This + can be abused for a DoS on the server. This only affect a server + that has enabled the h2 protocol.</p> + </blockquote> + </body> + </description> + <references> + <url>http://httpd.apache.org/security/vulnerabilities_24.html</url> + <cvename>CVE-2018-11763</cvename> + </references> + <dates> + <discovery>2018-09-25</discovery> + <entry>2018-09-26</entry> + </dates> + </vuln> + <vuln vid="6bf71117-c0c9-11e8-b760-6023b685b1ee"> <topic>mantis -- XSS vulnerability</topic> <affects> |