summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorBernard Spil <brnrd@FreeBSD.org>2016-12-29 13:08:32 +0000
committerBernard Spil <brnrd@FreeBSD.org>2016-12-29 13:08:32 +0000
commit584da89984f7ddb4e41deaee7673ae7b72a70c3b (patch)
tree52ae9db163ba3b1582fafbf813cbd9674fcc7dcc /security
parent- Fix fetch: the only ftp MASTER_SITE requires extended passive mode support ... (diff)
security/vuxml: Document h2o vulnerability
PR: 215587 Submitted by: Dave Cottlehuber <dch@skunkwerks.at> (maintainer)
Notes
Notes: svn path=/head/; revision=429906
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml28
1 files changed, 28 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 8d76178257d0..09cfef942bda 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,34 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="d0b12952-cb86-11e6-906f-0cc47a065786">
+ <topic>www/h2o -- Use-after-free vulnerability</topic>
+ <affects>
+ <package>
+ <name>h2o</name>
+ <range><lt>2.0.4_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Kazuho Oku reports:</p>
+ <blockquote cite="https://github.com/h2o/h2o/issues?q=label%3Avulnerability">
+ <p>A use-after-free vulnerability exists in H2O up to and including
+ version 2.0.4 / 2.1.0-beta3 that can be used by a remote attacker to
+ mount DoS attacks and / or information theft.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/h2o/h2o/releases/tag/v2.0.5</url>
+ <url>https://github.com/h2o/h2o/issues/1144</url>
+ </references>
+ <dates>
+ <discovery>2016-09-09</discovery>
+ <entry>2016-12-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="1b61ecef-cdb9-11e6-a9a5-b499baebfeaf">
<topic>PHP -- multiple vulnerabilities</topic>
<affects>