Hi,

I just noticed that portaudit considers www/nginx >=1.2.0,1 <1.4.1,1 to
be affected by CVE-2013-2028, creating noise and preventing
installation:

http://portaudit.freebsd.org/efaa4071-b700-11e2-b1b9-f0def16c5c1b.html

According to the announcement on the nginx mailing list, only versions
of nginx >= 1.3.9 < 1.4.1,1 should be affected:

http://mailman.nginx.org/pipermail/nginx-announce/2013/000112.html
and the fix in nginx trac
http://trac.nginx.org/nginx/changeset/5189/nginx

I just checked the source of 1.2.8 (the current version in ports,
www/nginx) and it doesn't even contain the affected functionality, nor
the affected function implementing it (ngx_http_parse_chunked). This is
in line with additional media and bugtracker coverage:

https://bugzilla.redhat.com/show_bug.cgi?id=960605
http://www.openwall.com/lists/oss-security/2013/05/07/3
http://www.ehackingnews.com/2013/05/cve-2013-2028-buffer-overflow.html
http://www.h-online.com/open/news/item/NGINX-patches-major-security-flaw-1858438.html

Long story short: I would kindly ask you to correct the entry in the
portaudit database to match only affected versions of nginx.

Cheers,
Michael

-- 
Michael Gmelin
_______________________________________________
freebsd-ports@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-ports
To unsubscribe, send any mail to "freebsd-ports-unsubscr...@freebsd.org"

Reply via email to