diff options
-rw-r--r-- | security/vuxml/vuln.xml | 37 |
1 files changed, 37 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index a6514a120513..7065e8cdb04c 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,43 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="87679fcb-be60-11e9-9051-4c72b94353b5"> + <topic>NGINX -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>nginx</name> + <range><lt>1.16.1</lt></range> + </package> + <package> + <name>nginx-devel</name> + <range><lt>1.17.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>NGINX Team reports:</p> + <blockquote cite="http://nginx.org/en/security_advisories.html"> + <p>Several security issues were identified in nginx HTTP/2 + implementation which might cause excessive memory consumption + and CPU usage (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516). + The issues affect nginx compiled with the ngx_http_v2_module (not + compiled by default) if the http2 option of the listen directive + is used in a configuration file.</p> + </blockquote> + </body> + </description> + <references> + <url>http://nginx.org/en/security_advisories.html</url> + <cvename>CVE-2019-9511</cvename> + <cvename>CVE-2019-9513</cvename> + <cvename>CVE-2019-9516</cvename> + </references> + <dates> + <discovery>2019-08-13</discovery> + <entry>2019-08-14</entry> + </dates> + </vuln> + <vuln vid="0569146e-bdef-11e9-bd31-8de4a4470bbb"> <topic>Nokogiri -- injection vulnerability</topic> <affects> |