comparison xml/en/security_advisories.xml @ 2272:3fa4584907b8

nginx-1.15.6, nginx-1.14.1
author Maxim Dounin <mdounin@mdounin.ru>
date Tue, 06 Nov 2018 17:51:30 +0300
parents cf8d95bfcf72
children 626533759806
comparison
equal deleted inserted replaced
2271:34a1901e663d 2272:3fa4584907b8
21 Patches are signed using one of the 21 Patches are signed using one of the
22 <link doc="pgp_keys.xml">PGP public keys</link>. 22 <link doc="pgp_keys.xml">PGP public keys</link>.
23 </para> 23 </para>
24 24
25 <security> 25 <security>
26
27 <item name="Excessive memory usage in HTTP/2"
28 severity="low"
29 cve="2018-16843"
30 good="1.15.6+, 1.14.1+"
31 vulnerable="1.9.5-1.15.5">
32 </item>
33
34 <item name="Excessive CPU usage in HTTP/2"
35 severity="low"
36 cve="2018-16844"
37 good="1.15.6+, 1.14.1+"
38 vulnerable="1.9.5-1.15.5">
39 </item>
40
41 <item name="Memory disclosure in the ngx_http_mp4_module"
42 severity="medium"
43 cve="2018-16845"
44 good="1.15.6+, 1.14.1+"
45 vulnerable="1.1.3-1.15.5, 1.0.7-1.0.15">
46 <patch name="patch.2018.mp4.txt" />
47 </item>
26 48
27 <item name="Integer overflow in the range filter" 49 <item name="Integer overflow in the range filter"
28 severity="medium" 50 severity="medium"
29 advisory="http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html" 51 advisory="http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html"
30 cve="2017-7529" 52 cve="2017-7529"