Mercurial > hg > nginx-site
view xml/en/security_advisories.xml @ 1009:135920b5c61d
Marked strings with entities in japanese translation as literal.
This allows to preserve information and produce correct output if the XML
parser expands entities on input. The markup is similar to english and
russian versions of the document.
author | Vladimir Homutov <vl@nginx.com> |
---|---|
date | Mon, 11 Nov 2013 11:54:16 +0400 |
parents | ef5485fb932d |
children | f7fe7da742c6 |
line wrap: on
line source
<!-- Copyright (C) Igor Sysoev Copyright (C) Nginx, Inc. --> <!DOCTYPE article SYSTEM "../../dtd/article.dtd"> <article name="nginx security advisories" link="/en/security_advisories.html" lang="en" rev="1"> <section> <para> All nginx security issues should be reported to <link url="mailto:security-alert@nginx.org">security-alert@nginx.org</link>. </para> <para> Patches are signed using one of the <link doc="pgp_keys.xml">PGP public keys</link>. </para> <security> <item name="Memory disclosure with specially crafted HTTP backend responses" severity="medium" advisory="http://mailman.nginx.org/pipermail/nginx-announce/2013/000114.html" cve="2013-2070" good="1.5.0+, 1.4.1+, 1.2.9+" vulnerable="1.1.4-1.2.8, 1.3.9-1.4.0"> <patch name="patch.2013.chunked.txt" versions="1.3.9-1.4.0" /> <patch name="patch.2013.proxy.txt" versions="1.1.4-1.2.8" /> </item> <item name="Stack-based buffer overflow with specially crafted request" severity="major" advisory="http://mailman.nginx.org/pipermail/nginx-announce/2013/000112.html" cve="2013-2028" good="1.5.0+, 1.4.1+" vulnerable="1.3.9-1.4.0"> <patch name="patch.2013.chunked.txt" /> </item> <item name="Vulnerabilities with Windows directory aliases" severity="medium" advisory="http://mailman.nginx.org/pipermail/nginx-announce/2012/000086.html" cve="2011-4963" good="1.3.1+, 1.2.1+" vulnerable="nginx/Windows 0.7.52-1.3.0" /> <item name="Buffer overflow in the ngx_http_mp4_module" severity="major" advisory="http://mailman.nginx.org/pipermail/nginx-announce/2012/000080.html" cve="2012-2089" good="1.1.19+, 1.0.15+" vulnerable="1.1.3-1.1.18, 1.0.7-1.0.14"> <patch name="patch.2012.mp4.txt" /> </item> <item name="Memory disclosure with specially crafted backend responses" severity="major" advisory="http://mailman.nginx.org/pipermail/nginx-announce/2012/000076.html" cve="2012-1180" good="1.1.17+, 1.0.14+" vulnerable="0.1.0-1.1.16"> <patch name="patch.2012.memory.txt" /> </item> <item name="Buffer overflow in resolver" severity="medium" cve="2011-4315" good="1.1.8+, 1.0.10+" vulnerable="0.6.18-1.1.7" /> <item name="Vulnerabilities with invalid UTF-8 sequence on Windows" severity="major" cve="2010-2266" good="0.8.41+, 0.7.67+" vulnerable="nginx/Windows 0.7.52-0.8.40" /> <item name="Vulnerabilities with Windows file default stream" severity="major" cve="2010-2263" good="0.8.40+, 0.7.66+" vulnerable="nginx/Windows 0.7.52-0.8.39" /> <item name="Vulnerabilities with Windows 8.3 filename pseudonyms" severity="major" core="CORE-2010-0121" href="http://www.coresecurity.com/content/filename-pseudonyms-vulnerabilities" good="0.8.33+, 0.7.65+" vulnerable="nginx/Windows 0.7.52-0.8.32" /> <item name="An error log data are not sanitized" severity="none" cve="2009-4487" good="none" vulnerable="all" /> <item name="The renegotiation vulnerability in SSL protocol" severity="major" cert="120541" cve="2009-3555" good="0.8.23+, 0.7.64+" vulnerable="0.1.0-0.8.22"> <patch name="patch.cve-2009-3555.txt" /> </item> <item name="Directory traversal vulnerability" severity="minor" cve="2009-3898" good="0.8.17+, 0.7.63+" vulnerable="0.1.0-0.8.16" /> <item name="Buffer underflow vulnerability" severity="major" cert="180065" cve="2009-2629" good="0.8.15+, 0.7.62+, 0.6.39+, 0.5.38+" vulnerable="0.1.0-0.8.14"> <patch name="patch.180065.txt" /> </item> <item name="Null pointer dereference vulnerability" severity="major" cve="2009-3896" good="0.8.14+, 0.7.62+, 0.6.39+, 0.5.38+" vulnerable="0.1.0-0.8.13"> <patch name="patch.null.pointer.txt" /> </item> </security> </section> </article>