Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 677644 (CVE-2019-7401) - <www-servers/nginx-unit-1.7.1 - heap memory buffer overflow might have been caused in the router process by a specially crafted request, potentially resulting in a segmentation fault or other unspecified behavior (CVE-2019-7401)
Summary: <www-servers/nginx-unit-1.7.1 - heap memory buffer overflow might have been c...
Status: RESOLVED FIXED
Alias: CVE-2019-7401
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://mailman.nginx.org/pipermail/u...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2019-02-10 13:41 UTC by Jeroen Roovers (RETIRED)
Modified: 2019-08-04 18:11 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jeroen Roovers (RETIRED) gentoo-dev 2019-02-10 13:41:43 UTC
"
This is a bugfix release of NGINX Unit that eliminates a security flaw.
All versions of Unit from 0.3 to 1.7 are affected.

Everybody is strongly advised to update to a new version.
"
Comment 1 Ralph Seichter 2019-02-10 14:55:55 UTC
I've opened https://github.com/gentoo/gentoo/pull/11002 to deal with this issue three days before the bug report was filed, but unfortunately nobody has picked up the PR yet.
Comment 2 Jeroen Roovers (RETIRED) gentoo-dev 2019-02-10 15:42:21 UTC
(In reply to Ralph Seichter from comment #1)
> three days before the bug report was filed, but unfortunately nobody
> has picked up the PR yet.

Because no one was aware that there was a security issue to fix? Maybe the PR process can be improved with flags that signal security bugs to people who need to know about it? Or you just file your own security bug reports?
Comment 3 Ralph Seichter 2019-02-10 20:18:24 UTC
Allowing pull request authors to add flags like "security related" is something I'd appreciate. I included the term security in the PR's subject line, but apparently that is not enough to make a pull request stand out, given the volume that needs to be processed.
Comment 4 Kristian Fiskerstrand (RETIRED) gentoo-dev 2019-02-10 23:30:34 UTC
(In reply to Ralph Seichter from comment #3)
> Allowing pull request authors to add flags like "security related" is
> something I'd appreciate. I included the term security in the PR's subject
> line, but apparently that is not enough to make a pull request stand out,
> given the volume that needs to be processed.

The only acceptable workflow for Gentoo is the bugtracker, so it needs to be within this context.
Comment 5 Ralph Seichter 2019-02-11 02:50:38 UTC
(In reply to Kristian Fiskerstrand from comment #4)

> The only acceptable workflow for Gentoo is the bugtracker [...]
That's not how I interpret what I read on the Gentoo Developers mailing list over the last months. My understanding is that using GitHub is the predominant way to get changes into the Gentoo tree, not Bugzilla.

I don't mean to start a debate here; that's something for the mailing list.
Comment 6 Larry the Git Cow gentoo-dev 2019-08-04 11:11:11 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=11fab555d65c1148e80b372503750765f8b04e10

commit 11fab555d65c1148e80b372503750765f8b04e10
Author:     Ralph Seichter <gentoo@seichter.de>
AuthorDate: 2019-08-04 10:40:45 +0000
Commit:     Michał Górny <mgorny@gentoo.org>
CommitDate: 2019-08-04 11:08:46 +0000

    www-servers/nginx-unit: Remove obsolete ebuilds
    
    Package-Manager: Portage-2.3.69, Repoman-2.3.16
    Signed-off-by: Ralph Seichter <gentoo@seichter.de>
    Bug: https://bugs.gentoo.org/677644
    Closes: https://github.com/gentoo/gentoo/pull/12616
    Signed-off-by: Michał Górny <mgorny@gentoo.org>

 www-servers/nginx-unit/Manifest                 |  5 --
 www-servers/nginx-unit/nginx-unit-1.3-r1.ebuild | 52 -------------------
 www-servers/nginx-unit/nginx-unit-1.3.ebuild    | 39 ---------------
 www-servers/nginx-unit/nginx-unit-1.5.ebuild    | 66 -------------------------
 www-servers/nginx-unit/nginx-unit-1.6.ebuild    | 66 -------------------------
 www-servers/nginx-unit/nginx-unit-1.7.1.ebuild  | 66 -------------------------
 www-servers/nginx-unit/nginx-unit-1.7.ebuild    | 66 -------------------------
 7 files changed, 360 deletions(-)
Comment 7 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2019-08-04 11:12:04 UTC
I think this cleans up all vulnerable versions.  Security, please do your dance.