You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by jo...@apache.org on 2015/07/17 16:31:54 UTC

svn commit: r1691571 - /httpd/site/trunk/content/security/vulnerabilities-httpd.xml

Author: jorton
Date: Fri Jul 17 14:31:54 2015
New Revision: 1691571

URL: http://svn.apache.org/r1691571
Log:
Add CVE-2015-0228.

Modified:
    httpd/site/trunk/content/security/vulnerabilities-httpd.xml

Modified: httpd/site/trunk/content/security/vulnerabilities-httpd.xml
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/vulnerabilities-httpd.xml?rev=1691571&r1=1691570&r2=1691571&view=diff
==============================================================================
--- httpd/site/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ httpd/site/trunk/content/security/vulnerabilities-httpd.xml Fri Jul 17 14:31:54 2015
@@ -1,5 +1,28 @@
 <security updated="20150717">
 
+<issue fixed="2.4.16" reported="20150128" public="20150204" released="20150715">
+<cve name="CVE-2015-0228"/>
+<severity level="4">low</severity>
+<title>mod_lua: Crash in websockets PING handling</title>
+<description><p>
+
+  A stack recursion crash in the mod_lua module was found.  A Lua
+  script executing the r:wsupgrade() function could crash the process
+  if a malicious client sent a carefully crafted PING request.  This
+  issue affected releases 2.4.7 through 2.4.12 inclusive.
+  
+</p></description>
+<affects prod="httpd" version="2.4.12"/>
+<affects prod="httpd" version="2.4.10"/>
+<affects prod="httpd" version="2.4.9"/>
+<affects prod="httpd" version="2.4.8"/>
+<affects prod="httpd" version="2.4.7"/>
+<acknowledgements>
+This issue was reported by Guido Vranken.
+</acknowledgements>
+</issue>
+
+  
 <issue fixed="2.4.16" reported="20150203" public="20150305" released="20150715">
 <cve name="CVE-2015-0253"/>
 <severity level="4">low</severity>