git: 14dc2636e72c - main - security/vuxml: document buffer overread vulnerability in nginx
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 22 Aug 2024 01:35:58 UTC
The branch main has been updated by osa: URL: https://cgit.FreeBSD.org/ports/commit/?id=14dc2636e72c396459a6559868033910ee8a4532 commit 14dc2636e72c396459a6559868033910ee8a4532 Author: Sergey A. Osokin <osa@FreeBSD.org> AuthorDate: 2024-08-22 01:31:17 +0000 Commit: Sergey A. Osokin <osa@FreeBSD.org> CommitDate: 2024-08-22 01:35:52 +0000 security/vuxml: document buffer overread vulnerability in nginx CVE-2024-7347 --- security/vuxml/vuln/2024.xml | 30 ++++++++++++++++++++++++++++++ 1 file changed, 30 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index a63cbbec6d42..f5e6a31e37f8 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,33 @@ + <vuln vid="addc71b8-6024-11ef-86a1-8c164567ca3c"> + <topic>nginx -- Vulnerability in the ngx_http_mp4_module</topic> + <affects> + <package> + <name>nginx-devel</name> + <range><ge>1.5.13</ge><lt>1.27.1</lt></range> + </package> + <package> + <name>nginx</name> + <range><ge>1.6.0</ge><lt>1.26.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The nginx development team reports:</p> + <blockquote cite="http://nginx.org/en/security_advisories.html"> + <p>This update fixes the buffer overread vulnerability in the + ngx_http_mp4_module.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-7347</cvename> + </references> + <dates> + <discovery>2024-08-14</discovery> + <entry>2024-08-22</entry> + </dates> + </vuln> + <vuln vid="04c9c3f8-5ed3-11ef-8262-b0416f0c4c67"> <topic>Jinja2 -- Vulnerable to HTML attribute injection when passing user input as keys to xmlattr filter</topic> <affects>