Mailinglist Archive: opensuse-updates (102 mails)

< Previous Next >
openSUSE-SU-2014:0450-1: moderate: nginx: update to 1.4.7
openSUSE Security Update: nginx: update to 1.4.7
______________________________________________________________________________

Announcement ID: openSUSE-SU-2014:0450-1
Rating: moderate
References: #869076
Cross-References: CVE-2014-0133
Affected Products:
openSUSE 13.1
______________________________________________________________________________

An update that fixes one vulnerability is now available.

Description:

nginx was updated to 1.4.7 to fix bugs and security issues.

Fixed security issues:
* CVE-2014-0133: nginx:heap-based buffer overflow in SPDY
implementation

New upstream release 1.4.7 (bnc#869076) (CVE-2014-0133)
*) Security: a heap memory buffer overflow might occur
in a worker process while handling a specially crafted
request by ngx_http_spdy_module, potentially resulting in
arbitrary code execution (CVE-2014-0133). Thanks to Lucas
Molas, researcher at Programa STIC, Fundación Dr. Manuel
Sadosky, Buenos Aires, Argentina.
*) Bugfix: in the "fastcgi_next_upstream" directive.
Thanks to Lucas Molas.
*) Bugfix: the "client_max_body_size" directive might
not work when reading a request body using chunked transfer
encoding; the bug had appeared in 1.3.9. Thanks to Lucas
Molas.
*) Bugfix: a segmentation fault might occur in a worker
process when proxying WebSocket connections.
*) Bugfix: the $ssl_session_id variable contained full
session serialized instead of just a session id. Thanks to
Ivan Ristić.
*) Bugfix: client connections might be immediately
closed if deferred accept was used; the bug had appeared in
1.3.15.
*) Bugfix: alerts "zero size buf in output" might
appear in logs while proxying; the bug had appeared in
1.3.9.
*) Bugfix: a segmentation fault might occur in a worker
process if the ngx_http_spdy_module was used.
*) Bugfix: proxied WebSocket connections might hang
right after handshake if the select, poll, or /dev/poll
methods were used.
*) Bugfix: a timeout might occur while reading client
request body in an SSL connection using chunked transfer
encoding.
*) Bugfix: memory leak in nginx/Windows.


Patch Instructions:

To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- openSUSE 13.1:

zypper in -t patch openSUSE-2014-258

To bring your system up-to-date, use "zypper patch".


Package List:

- openSUSE 13.1 (i586 x86_64):

nginx-1.4.7-3.9.1
nginx-debuginfo-1.4.7-3.9.1
nginx-debugsource-1.4.7-3.9.1


References:

http://support.novell.com/security/cve/CVE-2014-0133.html
https://bugzilla.novell.com/869076


< Previous Next >
This Thread
  • No further messages