FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-24 21:00:48 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
00b296b6-7db1-11e0-96b7-00300582f9fcApache APR -- DoS vulnerabilities

The Apache Portable Runtime Project reports:

Note especially a security fix to APR 1.4.4, excessive CPU consumption was possible due to an unconstrained, recursive invocation of apr_fnmatch, as apr_fnmatch processed '*' wildcards. Reimplement apr_fnmatch() from scratch using a non-recursive algorithm now has improved compliance with the fnmatch() spec. (William Rowe)


Discovery 2011-05-10
Entry 2011-05-12
apr1
< 1.4.4.1.3.11

CVE-2011-0419
http://www.apache.org/dist/apr/Announcement1.x.html
99a5590c-857e-11e0-96b7-00300582f9fcApache APR -- DoS vulnerabilities

The Apache Portable Runtime Project reports:

A flaw was discovered in the apr_fnmatch() function in the Apache Portable Runtime (APR) library 1.4.4 (or any backported versions that contained the upstream fix for CVE-2011-0419). This could cause httpd workers to enter a hung state (100% CPU utilization).

apr-util 1.3.11 could cause crashes with httpd's mod_authnz_ldap in some situations.


Discovery 2011-05-19
Entry 2011-05-23
apr1
< 1.4.5.1.3.12

47929
CVE-2011-1928
CVE-2011-0419
http://www.apache.org/dist/apr/Announcement1.x.html
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-1928
dd943fbb-d0fe-11df-95a8-00219b0fc4d8apr -- multiple vunerabilities

Secunia reports:

Multiple vulnerabilities have been reported in APR-util, which can be exploited by malicious people to cause a DoS (Denial of Service).

Two XML parsing vulnerabilities exist in the bundled version of expat.

An error within the "apr_brigade_split_line()" function in buckets/apr_brigade.c can be exploited to cause high memory consumption.


Discovery 2010-10-02
Entry 2010-10-06
Modified 2010-10-20
apr1
< 1.4.2.1.3.10

apr0
< 0.9.19.0.9.19

43673
CVE-2009-3560
CVE-2009-3720
CVE-2010-1623
http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3
http://secunia.com/advisories/41701