Summary: | <www-servers/nginx-0.7.64: NULL pointer dereference (CVE-2009-3896) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | hollow, voxus |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://sysoev.ru/nginx/patch.null.pointer.txt | ||
Whiteboard: | B3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 293785 | ||
Bug Blocks: |
Description
Stefan Behte (RETIRED)
![]() ![]() CVE-2009-3896 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3896): src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI. I've bumped to 0.7.64 and 0.8.29. Let me know if anyone really wants an older branch. 0.7.64 is stable on all platforms where any version is stable, resolving. reopening. Adding to existing GLSA request. This issue was resolved and addressed in GLSA 201203-22 at http://security.gentoo.org/glsa/glsa-201203-22.xml by GLSA coordinator Sean Amoss (ackle). |