Summary: | <www-servers/nginx-1.4.7: [nginx_modules_http_spdy] heap memory buffer overflow (CVE-2014-0133) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Johan Bergström <bugs> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | alex_y_xu, dev-zero |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html | ||
Whiteboard: | B1 [glsa] | ||
Package list: | Runtime testing required: | --- |
Description
Johan Bergström
2014-03-18 20:53:39 UTC
I think it is plausible that at least 5% of Gentoo users have nginx installed. However, USE=debug is likely highly rare. Perhaps C1 is more appropriate. @Alex: The bug will occur if you've built the spdy module without debug. Odd, I swear I read "with --with-debug". Never mind then, definitely B1. Not A1 though, spdy is far from default. nginx-1.4.7 is now in the tree for stabilization, 1.5.12 follows... Arches, please test and mark stable: =www-servers/nginx-1.4.7 Target keywords : "amd64 x86" amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one. cleanup done. Arches and Maintainer(s), Thank you for your work. New GLSA Request filed. CVE-2014-0133 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0133): Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request. This issue was resolved and addressed in GLSA 201406-20 at http://security.gentoo.org/glsa/glsa-201406-20.xml by GLSA coordinator Mikle Kolyada (Zlogene). |