comparison xml/en/security_advisories.xml @ 2010:18ff9016b82f

nginx-1.13.3, nginx-1.12.1
author Maxim Dounin <mdounin@mdounin.ru>
date Tue, 11 Jul 2017 18:40:50 +0300
parents ecea2f0d22b6
children cf8d95bfcf72
comparison
equal deleted inserted replaced
2009:9b7302e3b21f 2010:18ff9016b82f
21 Patches are signed using one of the 21 Patches are signed using one of the
22 <link doc="pgp_keys.xml">PGP public keys</link>. 22 <link doc="pgp_keys.xml">PGP public keys</link>.
23 </para> 23 </para>
24 24
25 <security> 25 <security>
26
27 <item name="Integer overflow in the range filter"
28 severity="medium"
29 cve="2017-7529"
30 good="1.13.3+, 1.12.1+"
31 vulnerable="0.5.6-1.13.2">
32 <patch name="patch.2017.ranges.txt" />
33 </item>
26 34
27 <item name="NULL pointer dereference while writing client request body" 35 <item name="NULL pointer dereference while writing client request body"
28 severity="medium" 36 severity="medium"
29 advisory="http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" 37 advisory="http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html"
30 cve="2016-4450" 38 cve="2016-4450"