FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-19 20:48:44 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
0882f019-bd60-11eb-9bdd-8c164567ca3cNGINX -- 1-byte memory overwrite in resolver

NGINX team reports:

1-byte memory overwrite might occur during DNS server response processing if the "resolver" directive was used, allowing an attacker who is able to forge UDP packets from the DNS server to cause worker process crash or, potentially, arbitrary code execution.


Discovery 2021-05-25
Entry 2021-05-25
nginx
< 1.20.1,2

nginx-devel
< 1.21.0

CVE-2021-23017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017
0c14dfa7-879e-11e1-a2a0-00500802d8f7nginx -- Buffer overflow in the ngx_http_mp4_module

The nginx project reports:

Buffer overflow in the ngx_http_mp4_module


Discovery 2012-04-12
Entry 2012-04-16
nginx
< 1.0.15

nginx-devel
< 1.1.19

CVE-2012-2089
http://nginx.org/en/security_advisories.html
152b27f0-a158-11de-990c-e5b1d4c882e0nginx -- remote denial of service vulnerability

nginx development team reports:

A segmentation fault might occur in worker process while specially crafted request handling.


Discovery 2009-09-14
Entry 2009-09-14
Modified 2009-09-15
nginx
< 0.7.62

nginx-devel
< 0.8.15

CVE-2009-2629
http://nginx.net/CHANGES
http://lists.debian.org/debian-security-announce/2009/msg00205.html
29194cb8-6e9f-11e1-8376-f0def16c5c1bnginx -- potential information leak

nginx development team reports:

Matthew Daley recently discovered a security problem which may lead to a disclosure of previously freed memory on specially crafted response from an upstream server, potentially resulting in sensitive information leak.


Discovery 2012-03-15
Entry 2012-03-15
nginx
< 1.0.14,1

nginx-devel
< 1.1.17

http://nginx.net/CHANGES
36cf7670-2774-11e6-af29-f0def16c5c1bnginx -- a specially crafted request might result in worker process crash

Maxim Dounin reports:

A problem was identified in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while writing client request body to a temporary file.


Discovery 2016-05-31
Entry 2016-05-31
Modified 2016-06-05
nginx
ge 1.4.0 lt 1.8.1_3,2

ge 1.10.0,2 lt 1.10.1,2

nginx-devel
ge 1.3.9 lt 1.9.15_1

ge 1.10.0 lt 1.11.1

http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html
CVE-2016-4450
676d4f16-4fb3-11ed-a374-8c164567ca3cnginx -- Two vulnerabilities

NGINX Development Team reports:

Two security issues were identified in the ngx_http_mp4_module, which might allow an attacker to cause a worker process crash or worker process memory disclosure by using a specially crafted mp4 file, or might have potential other impact (CVE-2022-41741, CVE-2022-41742).


Discovery 2022-10-19
Entry 2022-10-19
nginx
ge 1.0.7 lt 1.22.1

nginx-devel
ge 1.1.3 lt 1.23.2

CVE-2022-41741
CVE-2022-41742
https://mailman.nginx.org/archives/list/nginx@nginx.org/thread/F7TMIHDNNU3M52GYS23UWDWW2R2BLVVH/
77b784bb-3dc6-11e4-b191-f0def16c5c1bnginx -- inject commands into SSL session vulnerability

The nginx project reports:

Security: it was possible to reuse SSL sessions in unrelated contexts if a shared SSL session cache or the same TLS session ticket key was used for multiple "server" blocks (CVE-2014-3616).


Discovery 2014-09-16
Entry 2014-09-16
nginx
ge 0.6.0 lt 1.6.2,2

nginx-devel
ge 0.5.6 lt 1.7.5

CVE-2014-3616
http://mailman.nginx.org/pipermail/nginx-announce/2014/000147.html
84ca56be-e1de-11e8-bcfd-00e04c1ea73dNGINX -- Multiple vulnerabilities

NGINX Team reports:

Two security issues were identified in nginx HTTP/2 implementation, which might cause excessive memory consumption (CVE-2018-16843) and CPU usage (CVE-2018-16844).

The issues affect nginx compiled with the ngx_http_v2_module (not compiled by default) if the "http2" option of the "listen" directive is used in a configuration file.

A security issue was identified in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory isclosure by using a specially crafted mp4 file (CVE-2018-16845).

The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the "mp4" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.


Discovery 2018-11-06
Entry 2018-11-06
nginx
< 1.14.1

nginx-devel
< 1.15.6

http://nginx.org/en/security_advisories.html
CVE-2018-16843
CVE-2018-16844
CVE-2018-16845
87679fcb-be60-11e9-9051-4c72b94353b5NGINX -- Multiple vulnerabilities

NGINX Team reports:

Several security issues were identified in nginx HTTP/2 implementation which might cause excessive memory consumption and CPU usage (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516). The issues affect nginx compiled with the ngx_http_v2_module (not compiled by default) if the http2 option of the listen directive is used in a configuration file.


Discovery 2019-08-13
Entry 2019-08-14
Modified 2019-08-14
nginx
< 1.16.1,2

nginx-devel
< 1.17.3

http://nginx.org/en/security_advisories.html
CVE-2019-9511
CVE-2019-9513
CVE-2019-9516
89db3b31-a4c3-11e3-978f-f0def16c5c1bnginx -- SPDY memory corruption

The nginx project reports:

A bug in the experimental SPDY implementation in nginx 1.5.10 was found, which might allow an attacker to corrupt worker process memory by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0088).

The problem only affects nginx 1.5.10 on 32-bit platforms, compiled with the ngx_http_spdy_module module (which is not compiled by default), if the "spdy" option of the "listen" directive is used in a configuration file.


Discovery 2014-03-04
Entry 2014-03-06
nginx-devel
eq 1.5.10

CVE-2014-0088
http://mailman.nginx.org/pipermail/nginx-announce/2014/000132.html
94b6264a-5140-11e3-8b22-f0def16c5c1bnginx -- Request line parsing vulnerability

The nginx project reports:

Ivan Fratric of the Google Security Team discovered a bug in nginx, which might allow an attacker to bypass security restrictions in certain configurations by using a specially crafted request, or might have potential other impact (CVE-2013-4547).


Discovery 2013-11-19
Entry 2013-11-19
nginx
ge 0.8.41 lt 1.4.4,1

nginx-devel
ge 0.8.41 lt 1.5.7

CVE-2013-4547
http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html
ad747a01-1fee-11e4-8ff1-f0def16c5c1bnginx -- inject commands into SSL session vulnerability

The nginx project reports:

Security: pipelined commands were not discarded after STARTTLS command in SMTP proxy (CVE-2014-3556); the bug had appeared in 1.5.6.


Discovery 2014-08-05
Entry 2014-08-09
nginx
ge 1.6.0,2 lt 1.6.1,2

nginx-devel
ge 1.5.6 lt 1.7.4

CVE-2014-3556
http://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html
b28adc5b-6693-11e7-ad43-f0def16c5c1bnginx -- a specially crafted request might result in an integer overflow

Maxim Dounin reports:

A security issue was identified in nginx range filter. A specially crafted request might result in an integer overflow and incorrect processing of ranges, potentially resulting in sensitive information leak (CVE-2017-7529).


Discovery 2017-07-11
Entry 2017-07-11
nginx
ge 0.5.6 lt 1.12.1,2

nginx-devel
ge 0.5.6 lt 1.13.3

http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html
CVE-2017-7529
c1202de8-4b29-11ea-9673-4c72b94353b5NGINX -- HTTP request smuggling

NGINX Team reports:

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.


Discovery 2019-12-10
Entry 2020-02-09
nginx
< 1.16.1_11,2

nginx-devel
< 1.17.7

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20372
CVE-2019-20372
c1c18ee1-c711-11e5-96d6-14dae9d210b8nginx -- multiple vulnerabilities

Maxim Dounin reports:

Several problems in nginx resolver were identified, which might allow an attacker to cause worker process crash, or might have potential other impact if the "resolver" directive is used in a configuration file.


Discovery 2016-01-26
Entry 2016-01-30
nginx
< 1.8.1,2

nginx-devel
< 1.9.10

http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html
CVE-2016-0742
CVE-2016-0746
CVE-2016-0747
da4b89ad-b28f-11e3-99ca-f0def16c5c1bnginx-devel -- SPDY heap buffer overflow

The nginx project reports:

A bug in the experimental SPDY implementation in nginx was found, which might allow an attacker to cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0133).

The problem affects nginx 1.3.15 - 1.5.11, compiled with the ngx_http_spdy_module module (which is not compiled by default) and without --with-debug configure option, if the "spdy" option of the "listen" directive is used in a configuration file.

The problem is fixed in nginx 1.5.12, 1.4.7.


Discovery 2014-03-18
Entry 2014-03-23
nginx-devel
ge 1.3.15 lt 1.5.12

CVE-2014-0133
http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html
efaa4071-b700-11e2-b1b9-f0def16c5c1bnginx -- multiple vulnerabilities

The nginx project reports:

A stack-based buffer overflow might occur in a worker process process while handling a specially crafted request, potentially resulting in arbitrary code execution. [CVE-2013-2028]

A security problem related to CVE-2013-2028 was identified, affecting some previous nginx versions if proxy_pass to untrusted upstream HTTP servers is used.

The problem may lead to a denial of service or a disclosure of a worker process memory on a specially crafted response from an upstream proxied server. [CVE-2013-2070]


Discovery 2013-05-07
Entry 2013-05-07
Modified 2013-05-16
nginx
ge 1.2.0,1 le 1.2.8,1

ge 1.3.0,1 lt 1.4.1,1

nginx-devel
ge 1.1.4 le 1.2.8

ge 1.3.0 lt 1.5.0

CVE-2013-2028
CVE-2013-2070
http://mailman.nginx.org/pipermail/nginx-announce/2013/000114.html
http://mailman.nginx.org/pipermail/nginx-announce/2013/000112.html