| Summary: | nginx new security issue CVE-2014-0133 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | Sam Bailey <sam> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | luigiwalser, rverschelde, sysadmin-bugs, tmb |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/591218/ | ||
| Whiteboard: | has_procedure MGA4-64-OK MGA4-32-OK advisory | ||
| Source RPM: | nginx-1.4.7-1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
Sam Bailey
2014-03-19 11:18:31 CET
I've tested this successfully on 64bit that everything still works, however as mentioned above there is no easy way to test the actual fix for the security issue.
Sam Bailey
2014-03-19 11:22:14 CET
Assignee:
bugsquad =>
qa-bugs and due to my typo above, the package is actually: nginx-1.4.7-1.mga4 with SRPM nginx-1.4.7-1.mga4.src.rpm
Sam Bailey
2014-03-19 11:30:25 CET
Component:
RPM Packages =>
Security
David Walser
2014-03-19 12:39:19 CET
QA Contact:
(none) =>
security Works fine on Mageia 4 i586. Sam's test should suffice for x86_64. This can be validated once the advisory is uploaded. Nice job Sam! Whiteboard:
(none) =>
has_procedure MGA4-64-OK MGA4-32-OK Advisory uploaded, please push to 4 core/updates. Keywords:
(none) =>
validated_update Update pushed: http://advisories.mageia.org/MGASA-2014-0136.html Status:
NEW =>
RESOLVED
David Walser
2014-03-20 21:17:42 CET
URL:
http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html =>
http://lwn.net/Vulnerabilities/591218/ |