FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-05-01 20:12:40 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
87679fcb-be60-11e9-9051-4c72b94353b5NGINX -- Multiple vulnerabilities

NGINX Team reports:

Several security issues were identified in nginx HTTP/2 implementation which might cause excessive memory consumption and CPU usage (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516). The issues affect nginx compiled with the ngx_http_v2_module (not compiled by default) if the http2 option of the listen directive is used in a configuration file.


Discovery 2019-08-13
Entry 2019-08-14
Modified 2019-08-14
nginx
< 1.16.1,2

nginx-devel
< 1.17.3

http://nginx.org/en/security_advisories.html
CVE-2019-9511
CVE-2019-9513
CVE-2019-9516
c1202de8-4b29-11ea-9673-4c72b94353b5NGINX -- HTTP request smuggling

NGINX Team reports:

NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.


Discovery 2019-12-10
Entry 2020-02-09
nginx
< 1.16.1_11,2

nginx-devel
< 1.17.7

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20372
CVE-2019-20372
0882f019-bd60-11eb-9bdd-8c164567ca3cNGINX -- 1-byte memory overwrite in resolver

NGINX team reports:

1-byte memory overwrite might occur during DNS server response processing if the "resolver" directive was used, allowing an attacker who is able to forge UDP packets from the DNS server to cause worker process crash or, potentially, arbitrary code execution.


Discovery 2021-05-25
Entry 2021-05-25
nginx
< 1.20.1,2

nginx-devel
< 1.21.0

CVE-2021-23017
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017
94b6264a-5140-11e3-8b22-f0def16c5c1bnginx -- Request line parsing vulnerability

The nginx project reports:

Ivan Fratric of the Google Security Team discovered a bug in nginx, which might allow an attacker to bypass security restrictions in certain configurations by using a specially crafted request, or might have potential other impact (CVE-2013-4547).


Discovery 2013-11-19
Entry 2013-11-19
nginx
ge 0.8.41 lt 1.4.4,1

nginx-devel
ge 0.8.41 lt 1.5.7

CVE-2013-4547
http://mailman.nginx.org/pipermail/nginx-announce/2013/000125.html
b28adc5b-6693-11e7-ad43-f0def16c5c1bnginx -- a specially crafted request might result in an integer overflow

Maxim Dounin reports:

A security issue was identified in nginx range filter. A specially crafted request might result in an integer overflow and incorrect processing of ranges, potentially resulting in sensitive information leak (CVE-2017-7529).


Discovery 2017-07-11
Entry 2017-07-11
nginx
ge 0.5.6 lt 1.12.1,2

nginx-devel
ge 0.5.6 lt 1.13.3

http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html
CVE-2017-7529
36cf7670-2774-11e6-af29-f0def16c5c1bnginx -- a specially crafted request might result in worker process crash

Maxim Dounin reports:

A problem was identified in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while writing client request body to a temporary file.


Discovery 2016-05-31
Entry 2016-05-31
Modified 2016-06-05
nginx
ge 1.4.0 lt 1.8.1_3,2

ge 1.10.0,2 lt 1.10.1,2

nginx-devel
ge 1.3.9 lt 1.9.15_1

ge 1.10.0 lt 1.11.1

http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html
CVE-2016-4450
29194cb8-6e9f-11e1-8376-f0def16c5c1bnginx -- potential information leak

nginx development team reports:

Matthew Daley recently discovered a security problem which may lead to a disclosure of previously freed memory on specially crafted response from an upstream server, potentially resulting in sensitive information leak.


Discovery 2012-03-15
Entry 2012-03-15
nginx
< 1.0.14,1

nginx-devel
< 1.1.17

http://nginx.net/CHANGES
77b784bb-3dc6-11e4-b191-f0def16c5c1bnginx -- inject commands into SSL session vulnerability

The nginx project reports:

Security: it was possible to reuse SSL sessions in unrelated contexts if a shared SSL session cache or the same TLS session ticket key was used for multiple "server" blocks (CVE-2014-3616).


Discovery 2014-09-16
Entry 2014-09-16
nginx
ge 0.6.0 lt 1.6.2,2

nginx-devel
ge 0.5.6 lt 1.7.5

CVE-2014-3616
http://mailman.nginx.org/pipermail/nginx-announce/2014/000147.html
c1c18ee1-c711-11e5-96d6-14dae9d210b8nginx -- multiple vulnerabilities

Maxim Dounin reports:

Several problems in nginx resolver were identified, which might allow an attacker to cause worker process crash, or might have potential other impact if the "resolver" directive is used in a configuration file.


Discovery 2016-01-26
Entry 2016-01-30
nginx
< 1.8.1,2

nginx-devel
< 1.9.10

http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html
CVE-2016-0742
CVE-2016-0746
CVE-2016-0747