Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 23 Mar 2014 15:52:32 +0100
From:      Remko Lodder <remko@FreeBSD.org>
To:        "Sergey A. Osokin" <osa@FreeBSD.org>
Cc:        svn-ports-head@freebsd.org, svn-ports-all@freebsd.org, ports-committers@freebsd.org
Subject:   Re: svn commit: r348855 - head/security/vuxml
Message-ID:  <482F13E4-4CD4-421E-BDAD-B918B2A17C11@FreeBSD.org>
In-Reply-To: <201403231340.s2NDevc4012818@svn.freebsd.org>
References:  <201403231340.s2NDevc4012818@svn.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--Apple-Mail=_4E5931A2-5F38-4DBB-B257-DF0E6A4A7C22
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


Hi Sergey,

This is more.. enthusiastic :-)

The idea was that if you add a new
<package>
<name>
<range>
</package>

in the existing entry, you can reuse the other text but denote which =
-devel
versions are affected..

Having two of the same entries is a bit..overkill :-)

Cheers
Remko

On 23 Mar 2014, at 14:40, Sergey A. Osokin <osa@FreeBSD.org> wrote:

> Author: osa
> Date: Sun Mar 23 13:40:57 2014
> New Revision: 348855
> URL: http://svnweb.freebsd.org/changeset/ports/348855
> QAT: https://qat.redports.org/buildarchive/r348855/
>=20
> Log:
>  Split nginx and nginx-devel entries, update date.
>=20
> Modified:
>  head/security/vuxml/vuln.xml
>=20
> Modified: head/security/vuxml/vuln.xml
> =
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D
> --- head/security/vuxml/vuln.xml	Sun Mar 23 13:26:20 2014	=
(r348854)
> +++ head/security/vuxml/vuln.xml	Sun Mar 23 13:40:57 2014	=
(r348855)
> @@ -51,14 +51,48 @@ Note:  Please add new entries to the beg
>=20
> -->
> <vuxml xmlns=3D"http://www.vuxml.org/apps/vuxml-1">;
> +  <vuln vid=3D"da4b89ad-b28f-11e3-99ca-f0def16c5c1b">
> +    <topic>nginx-devel -- SPDY heap buffer overflow</topic>
> +    <affects>
> +      <package>
> +	<name>nginx-devel</name>
> +	<range><ge>1.3.15</ge><lt>1.5.12</lt></range>
> +      </package>
> +    </affects>
> +    <description>
> +      <body xmlns=3D"http://www.w3.org/1999/xhtml">;
> +	<p>The nginx project reports:</p>
> +	<blockquote =
cite=3D"http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html=
">
> +	  <p>A bug in the experimental SPDY implementation in nginx was =
found, which
> +	   might allow an attacker to cause a heap memory buffer =
overflow in a
> +	   worker process by using a specially crafted request, =
potentially
> +	   resulting in arbitrary code execution (CVE-2014-0133).</p>
> +
> +	  <p>The problem affects nginx 1.3.15 - 1.5.11, compiled with =
the
> +	   ngx_http_spdy_module module (which is not compiled by =
default) and
> +	   without --with-debug configure option, if the "spdy" option =
of the
> +	   "listen" directive is used in a configuration file.</p>
> +
> +	  <p>The problem is fixed in nginx 1.5.12, 1.4.7.</p>
> +	</blockquote>
> +      </body>
> +    </description>
> +    <references>
> +      <cvename>CVE-2014-0133</cvename>
> +      =
<url>http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html</u=
rl>
> +    </references>
> +    <dates>
> +      <discovery>2014-03-18</discovery>
> +      <entry>2014-03-23</entry>
> +    </dates>
> +  </vuln>
> +
>   <vuln vid=3D"fc28df92-b233-11e3-99ca-f0def16c5c1b">
>     <topic>nginx -- SPDY heap buffer overflow</topic>
>     <affects>
>       <package>
> 	<name>nginx</name>
> -	<name>nginx-devel</name>
> 	<range><lt>1.4.7</lt></range>
> -	<range><lt>1.5.12</lt></range>
>       </package>
>     </affects>
>     <description>
> @@ -85,7 +119,7 @@ Note:  Please add new entries to the beg
>     </references>
>     <dates>
>       <discovery>2014-03-18</discovery>
> -      <entry>2014-03-18</entry>
> +      <entry>2014-03-23</entry>
>     </dates>
>   </vuln>
>=20
> _______________________________________________
> svn-ports-all@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/svn-ports-all
> To unsubscribe, send any mail to =
"svn-ports-all-unsubscribe@freebsd.org"

--=20

/"\   Best regards,                      | remko@FreeBSD.org
\ /   Remko Lodder                       | remko@EFnet
 X    http://www.evilcoder.org/          |
/ \   ASCII Ribbon Campaign              | Against HTML Mail and News


--Apple-Mail=_4E5931A2-5F38-4DBB-B257-DF0E6A4A7C22
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=9f6s
-----END PGP SIGNATURE-----

--Apple-Mail=_4E5931A2-5F38-4DBB-B257-DF0E6A4A7C22--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?482F13E4-4CD4-421E-BDAD-B918B2A17C11>