FreshPorts - VuXML
This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-04-24 21:00:48 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68
These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
02e51cb3-d7e4-11ed-9f7a-5404a68ad561 | traefik -- Use of vulnerable Go modules net/http, net/textproto
The Go project reports:
HTTP and MIME header parsing can allocate large amounts
of memory, even when parsing small inputs, potentially
leading to a denial of service. Certain unusual patterns
of input data can cause the common function used to parse
HTTP and MIME headers to allocate substantially more
memory than required to hold the parsed headers. An
attacker can exploit this behavior to cause an HTTP
server to allocate large amounts of memory from a small
request, potentially leading to memory exhaustion and a
denial of service. With fix, header parsing now correctly
allocates only the memory required to hold parsed headers.
Discovery 2023-03-10 Entry 2023-04-07 traefik
< 2.9.9_1
CVE-2023-24534
https://www.cve.org/CVERecord?id=CVE-2023-24534
CVE-2023-29013
https://www.cve.org/CVERecord?id=CVE-2023-29013
|