git: 49a20d12b790 - main - security/vuxml: Document www/nginx-devel vulns: CVE-2024-24989, CVE-2024-24990
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 15 Feb 2024 17:27:54 UTC
The branch main has been updated by zi: URL: https://cgit.FreeBSD.org/ports/commit/?id=49a20d12b7903802f9d09923ef3dbca4921f3c7f commit 49a20d12b7903802f9d09923ef3dbca4921f3c7f Author: Ryan Steinmetz <zi@FreeBSD.org> AuthorDate: 2024-02-15 17:26:42 +0000 Commit: Ryan Steinmetz <zi@FreeBSD.org> CommitDate: 2024-02-15 17:27:39 +0000 security/vuxml: Document www/nginx-devel vulns: CVE-2024-24989, CVE-2024-24990 --- security/vuxml/vuln/2024.xml | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 883c7166945e..0e2e0c9048f0 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,30 @@ + <vuln vid="c97a4ecf-cc25-11ee-b0ee-0050569f0b83"> + <topic>nginx-devel -- Multiple Vulnerabilities in HTTP/3</topic> + <affects> + <package> + <name>nginx-devel</name> + <range><lt>1.25.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The nginx development team reports:</p> + <blockquote cite="http://nginx.org/en/security_advisories.html"> + <p>When using HTTP/3 a segmentation fault might occur in a + worker process while processing a specially crafted QUIC session.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-24989</cvename> + <cvename>CVE-2024-24990</cvename> + </references> + <dates> + <discovery>2024-02-14</discovery> + <entry>2024-02-15</entry> + </dates> + </vuln> + <vuln vid="46a29f83-cb47-11ee-b609-002590c1f29c"> <topic>FreeBSD -- jail(2) information leak</topic> <affects>