aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorohauer <ohauer@FreeBSD.org>2014-07-25 04:12:51 +0800
committerohauer <ohauer@FreeBSD.org>2014-07-25 04:12:51 +0800
commit012cfe9d47dad5e0317feff425ed29b5074f7a29 (patch)
treeca98dc46bb85dc243546cc0f37a82c3ce36ee77c /security
parent6fd5d6bc0caff64c69ec57465676f0ccfa264c46 (diff)
downloadfreebsd-ports-gnome-012cfe9d47dad5e0317feff425ed29b5074f7a29.tar.gz
freebsd-ports-gnome-012cfe9d47dad5e0317feff425ed29b5074f7a29.tar.zst
freebsd-ports-gnome-012cfe9d47dad5e0317feff425ed29b5074f7a29.zip
- document apache22 CVE entries
MFH: 2014Q3
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml55
1 files changed, 55 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 78bb6c3337c8..1b8fd2e85256 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -57,6 +57,61 @@ Notes:
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f927e06c-1109-11e4-b090-20cf30e32f6d">
+ <topic>apache22 -- several vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>apache22</name>
+ <range><gt>2.2.0</gt><lt>2.2.27_6</lt></range>
+ </package>
+ <package>
+ <name>apache22-event-mpm</name>
+ <range><gt>2.2.0</gt><lt>2.2.27_6</lt></range>
+ </package>
+ <package>
+ <name>apache22-itk-mpm</name>
+ <range><gt>2.2.0</gt><lt>2.2.27_6</lt></range>
+ </package>
+ <package>
+ <name>apache22-peruser-mpm</name>
+ <range><gt>2.2.0</gt><lt>2.2.27_6</lt></range>
+ </package>
+ <package>
+ <name>apache22-worker-mpm</name>
+ <range><gt>2.2.0</gt><lt>2.2.27_6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Apache HTTP SERVER PROJECT reports:</p>
+ <blockquote cite="http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/CHANGES?revision=1611816&amp;view=markup">
+ <p> mod_deflate: The DEFLATE input filter (inflates request bodies) now
+ limits the length and compression ratio of inflated request bodies to
+ avoid denial of service via highly compressed bodies. See directives
+ DeflateInflateLimitRequestBody, DeflateInflateRatioLimit, and
+ DeflateInflateRatioBurst.</p>
+ <p>mod_cgid: Fix a denial of service against CGI scripts that do not consume
+ stdin that could lead to lingering HTTPD child processes filling up the
+ scoreboard and eventually hanging the server. By default, the client I/O
+ timeout (Timeout directive) now applies to communication with scripts. The
+ CGIDScriptTimeout directive can be used to set a different timeout for
+ communication with scripts.</p>
+ <p>Fix a race condition in scoreboard handling, which could lead to a heap
+ buffer overflow.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2014-0118</cvename>
+ <cvename>CVE-2014-0231</cvename>
+ <cvename>CVE-2014-0226</cvename>
+ </references>
+ <dates>
+ <discovery>2014-07-19</discovery>
+ <entry>2014-07-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="81fc1076-1286-11e4-bebd-000c2980a9f3">
<topic>tomcat -- multiple vulnerabilities</topic>
<affects>