SuSE has issued this advisory on February 9: http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00009.html Cauldron is not vulnerable.
CC: (none) => guillomovitch
Patched package uploaded. Advisory: ======================== Updated nginx package fixes security vulnerability: Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response (CVE-2011-4315). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4315 http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00009.html ======================== Updated packages in core/updates_testing: ======================== nginx-1.0.0-1.2.mga1 from nginx-1.0.0-1.2.mga2.src.rpm
Assignee: bugsquad => qa-bugs
I'm guessing the bugzilla mail to qa-bugs didn't get through for a time, so just pinging QA if you hadn't seen this one yet. If you already knew about it, sorry for the noise.
Testing complete on i586 for the srpm nginx-1.0.0-1.2.mga1.src.rpm Just testing that http://localhost/ shows the nginx page. You may want to fix ... grep Mandriva /usr/share/nginx/html/* /usr/share/nginx/html/404.html: Mandriva. It is located /usr/share/nginx/html/404.html: alt="[ Powered by Mandriva ]" /usr/share/nginx/html/50x.html: Mandriva. It is located /usr/share/nginx/html/50x.html: alt="[ Powered by Mandriva ]" /usr/share/nginx/html/index.html: <title>Test Page for the Nginx HTTP Server on Mandriva</title> /usr/share/nginx/html/index.html: <h1>Welcome to <strong>nginx 1.0.0</strong> on Mandriva!</h1> /usr/share/nginx/html/index.html: Mandriva. It is located in /usr/share/nginx/html/index.html: alt="[ Powered by Mandriva ]" As this is a security update, it's ok if you prefer to leave that fix for another update.
CC: (none) => davidwhodgins
Thanks Dave. Might as well fix it now. Fixed package uploaded. Advisory: ======================== Updated nginx package fixes security vulnerability: Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response (CVE-2011-4315). References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4315 http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00009.html ======================== Updated packages in core/updates_testing: ======================== nginx-1.0.0-1.3.mga1 from nginx-1.0.0-1.3.mga2.src.rpm
x86_64 There is still a logo at the bottom of the page 'Powered by Mandriva Linux' which links to mandriva.com It is /usr/share/nginx/html/poweredby.png It might be an idea to remove it completely as we don't have a replacement or replace it with a text link to mageia.org instead in /usr/share/nginx/html/index.html Other than that, it works as expected browsing to http://localhost
Created attachment 2105 [details] replacement for mdv poweredby.png It's just a Mageia logo suitably scaled.
Thanks Claire. Fixed package uploaded. Advisory: ======================== Updated nginx package fixes security vulnerability: Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response (CVE-2011-4315). References to Mandriva in the default index and 404 pages have been corrected to refer to Mageia. References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4315 http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00009.html ======================== Updated packages in core/updates_testing: ======================== nginx-1.0.0-1.4.mga1 from nginx-1.0.0-1.4.mga2.src.rpm
Testing complete on i586 for the srpm nginx-1.0.0-1.4.mga1.src.rpm Note mga1, not mga2.
Testing complete x86_64 Please see comment 7 for advisory. SRPM: nginx-1.0.0-1.4.mga1.src.rpm Could sysadmin please push from core/updates_testing to core/updates Thankyou!
Keywords: (none) => validated_updateCC: (none) => sysadmin-bugsHardware: i586 => All
Update pushed
Status: NEW => RESOLVEDCC: (none) => tmbResolution: (none) => FIXED