diff options
author | eadler <eadler@FreeBSD.org> | 2012-04-16 23:34:57 +0800 |
---|---|---|
committer | eadler <eadler@FreeBSD.org> | 2012-04-16 23:34:57 +0800 |
commit | 4ce0bf3f94a4f58e02accb1d22435357ce5b2d79 (patch) | |
tree | 185221350352564e7259b412097d2098fef9578f /security | |
parent | 4487ed8b946c2d2c7998c8d97e4440283fa5f21e (diff) | |
download | freebsd-ports-gnome-4ce0bf3f94a4f58e02accb1d22435357ce5b2d79.tar.gz freebsd-ports-gnome-4ce0bf3f94a4f58e02accb1d22435357ce5b2d79.tar.zst freebsd-ports-gnome-4ce0bf3f94a4f58e02accb1d22435357ce5b2d79.zip |
Add information about the recent nginx security vulnerability
PR: ports/166990
Submitted by: rodrigo osorio <rodrigo@bebik.net>
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d03ca7c6d178..e41156036bc8 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -52,6 +52,36 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="0c14dfa7-879e-11e1-a2a0-00500802d8f7"> + <topic>nginx -- Buffer overflow in the ngx_http_mp4_module</topic> + <affects> + <package> + <name>nginx</name> + <range><lt>1.0.15</lt></range> + </package> + <package> + <name>nginx-devel</name> + <range><lt>1.1.19</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The nginx project reports:</p> + <blockquote cite="http://nginx.org/en/security_advisories.html"> + <p>Buffer overflow in the ngx_http_mp4_module</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2012-2089</cvename> + <url>http://nginx.org/en/security_advisories.html</url> + </references> + <dates> + <discovery>2012-04-12</discovery> + <entry>2012-04-16</entry> + </dates> + </vuln> + <vuln vid="c80a3d93-8632-11e1-a374-14dae9ebcf89"> <topic>phpmyfaq -- Remote PHP Code Execution Vulnerability</topic> <affects> |