Upstream has issued an advisory yesterday (March 18): http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html Affects 1.3.15 - 1.5.11 so only Mageia 4 and Cauldron are affected. The issue is fixed upstream in 1.4.7 and 1.5.12, and there is a patch available as well. Cauldron has been updated to 1.5.12. Advisory: ======================== Updated nginx package fixes security vulnerability: A bug in the experimental SPDY implementation in nginx was found, which might allow an attacker to cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0133). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0133 http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html http://nginx.org/en/CHANGES-1.4 ----------------------------------- Updated packages in updates_testing: ----------------------------------- nginx-1.4.7-1.mga5 from SRPMS: nginx-1.4.7-1.mga4.src.rpm ---------------------- Testing: Not very easy to test the actual security fix. Steps to test upgrading: 1. Install the current nginx-1.4.5.mga4 package. 2. Start nginx 3. Go to http://localhost/ in a browser - should show the "Welcome to nginx 1.4.5 on Mageia!" page 4. Install the updated nginx-1.4.7.mga4 package. 5. Service will be automatically reload. 6. Go the http://localhost/ in a browser - should now show the "Welcome to nginx 1.4.7 on Mageia!" page. 7. Success Reproducible: Steps to Reproduce:
I've tested this successfully on 64bit that everything still works, however as mentioned above there is no easy way to test the actual fix for the security issue.
Assignee: bugsquad => qa-bugs
and due to my typo above, the package is actually: nginx-1.4.7-1.mga4 with SRPM nginx-1.4.7-1.mga4.src.rpm
Component: RPM Packages => Security
QA Contact: (none) => security
Works fine on Mageia 4 i586. Sam's test should suffice for x86_64. This can be validated once the advisory is uploaded. Nice job Sam!
Whiteboard: (none) => has_procedure MGA4-64-OK MGA4-32-OK
Advisory uploaded, please push to 4 core/updates.
Keywords: (none) => validated_updateWhiteboard: has_procedure MGA4-64-OK MGA4-32-OK => has_procedure MGA4-64-OK MGA4-32-OK advisoryCC: (none) => remi, sysadmin-bugs
Update pushed: http://advisories.mageia.org/MGASA-2014-0136.html
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED
URL: http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html => http://lwn.net/Vulnerabilities/591218/CC: (none) => luigiwalser