svn commit: r509146 - head/security/vuxml
Jochen Neumeister
joneum at FreeBSD.org
Sat Aug 17 11:07:34 UTC 2019
Author: joneum
Date: Sat Aug 17 11:07:33 2019
New Revision: 509146
URL: https://svnweb.freebsd.org/changeset/ports/509146
Log:
Add www/apache24
Sponsored by: Netzkommune GmbH
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Sat Aug 17 09:02:37 2019 (r509145)
+++ head/security/vuxml/vuln.xml Sat Aug 17 11:07:33 2019 (r509146)
@@ -58,6 +58,58 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="caf545f2-c0d9-11e9-9051-4c72b94353b5">
+ <topic>Apache -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>apache24</name>
+ <range><lt>2.4.41</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SO-AND-SO reports:</p>
+ <blockquote cite="http://www.apache.org/dist/httpd/CHANGES_2.4">
+ <h1>SECURITY: CVE-2019-10081</h1>
+ <p>mod_http2: HTTP/2 very early pushes, for example configured with "H2PushResource",
+ could lead to an overwrite of memory in the pushing request's pool,
+ leading to crashes. The memory copied is that of the configured push
+ link header values, not data supplied by the client.</p>
+ <h1>SECURITY: CVE-2019-9517</h1>
+ <p>mod_http2: a malicious client could perform a DoS attack by flooding
+ a connection with requests and basically never reading responses
+ on the TCP connection. Depending on h2 worker dimensioning, it was
+ possible to block those with relatively few connections.</p>
+ <h1>SECURITY: CVE-2019-10098</h1>
+ <p>rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable
+ matches and substitutions with encoded line break characters.</p>
+ <h1>SECURITY: CVE-2019-10092</h1>
+ <p>Remove HTML-escaped URLs from canned error responses to prevent misleading
+ text/links being displayed via crafted links.</p>
+ <h1>SECURITY: CVE-2019-10097</h1>
+ <p>mod_remoteip: Fix stack buffer overflow and NULL pointer deference
+ when reading the PROXY protocol header.</p>
+ <h1>CVE-2019-10082</h1>
+ <p>mod_http2: Using fuzzed network input, the http/2 session
+ handling could be made to read memory after being freed,
+ during connection shutdown.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.apache.org/dist/httpd/CHANGES_2.4</url>
+ <cvename>CVE-2019-10081</cvename>
+ <cvename>CVE-2019-9517</cvename>
+ <cvename>CVE-2019-10098</cvename>
+ <cvename>CVE-2019-10092</cvename>
+ <cvename>CVE-2019-10082</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-14</discovery>
+ <entry>2019-08-17</entry>
+ </dates>
+ </vuln>
+
<vuln vid="121fec01-c042-11e9-a73f-b36f5969f162">
<topic>nghttp2 -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-all
mailing list