comparison xml/en/security_advisories.xml @ 1647:e85d7bd9345f

Advisory links.
author Maxim Dounin <mdounin@mdounin.ru>
date Wed, 27 Jan 2016 18:15:30 +0300
parents d4b29af80036
children ce35c4764409
comparison
equal deleted inserted replaced
1646:03b2e0e2387e 1647:e85d7bd9345f
24 24
25 <security> 25 <security>
26 26
27 <item name="Invalid pointer dereference in resolver" 27 <item name="Invalid pointer dereference in resolver"
28 severity="medium" 28 severity="medium"
29 advisory="http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html"
29 cve="2016-0742" 30 cve="2016-0742"
30 good="1.9.10+, 1.8.1+" 31 good="1.9.10+, 1.8.1+"
31 vulnerable="0.6.18-1.9.9" /> 32 vulnerable="0.6.18-1.9.9" />
32 33
33 <item name="Use-after-free during CNAME response processing in resolver" 34 <item name="Use-after-free during CNAME response processing in resolver"
34 severity="medium" 35 severity="medium"
36 advisory="http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html"
35 cve="2016-0746" 37 cve="2016-0746"
36 good="1.9.10+, 1.8.1+" 38 good="1.9.10+, 1.8.1+"
37 vulnerable="0.6.18-1.9.9" /> 39 vulnerable="0.6.18-1.9.9" />
38 40
39 <item name="Insufficient limits of CNAME resolution in resolver" 41 <item name="Insufficient limits of CNAME resolution in resolver"
40 severity="medium" 42 severity="medium"
43 advisory="http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html"
41 cve="2016-0747" 44 cve="2016-0747"
42 good="1.9.10+, 1.8.1+" 45 good="1.9.10+, 1.8.1+"
43 vulnerable="0.6.18-1.9.9" /> 46 vulnerable="0.6.18-1.9.9" />
44 47
45 <item name="SSL session reuse vulnerability" 48 <item name="SSL session reuse vulnerability"
46 severity="medium" 49 severity="medium"
50 advisory="http://mailman.nginx.org/pipermail/nginx-announce/2014/000147.html"
47 cve="2014-3616" 51 cve="2014-3616"
48 good="1.7.5+, 1.6.2+" 52 good="1.7.5+, 1.6.2+"
49 vulnerable="0.5.6-1.7.4"> 53 vulnerable="0.5.6-1.7.4">
50 </item> 54 </item>
51 55