[nginx] nginx-1.4.7-RELEASE

Maxim Dounin mdounin at mdounin.ru
Tue Mar 18 16:40:42 UTC 2014


details:   http://hg.nginx.org/nginx/rev/636ce03634e7
branches:  stable-1.4
changeset: 5612:636ce03634e7
user:      Maxim Dounin <mdounin at mdounin.ru>
date:      Tue Mar 18 17:17:09 2014 +0400
description:
nginx-1.4.7-RELEASE

diffstat:

 docs/xml/nginx/changes.xml |  35 +++++++++++++++++++++++++++++++++++
 1 files changed, 35 insertions(+), 0 deletions(-)

diffs (45 lines):

diff --git a/docs/xml/nginx/changes.xml b/docs/xml/nginx/changes.xml
--- a/docs/xml/nginx/changes.xml
+++ b/docs/xml/nginx/changes.xml
@@ -5,6 +5,41 @@
 <change_log title="nginx">
 
 
+<changes ver="1.4.7" date="18.03.2014">
+
+<change type="security">
+<para lang="ru">
+при обработке специально созданного запроса модулем ngx_http_spdy_module
+могло происходить переполнение буфера в рабочем процессе,
+что потенциально могло приводить к выполнению произвольного кода
+(CVE-2014-0133).<br/>
+Спасибо Lucas Molas из Programa STIC, Fundación Dr. Manuel
+Sadosky, Buenos Aires, Argentina.
+</para>
+<para lang="en">
+a heap memory buffer overflow might occur in a worker process 
+while handling a specially crafted request by ngx_http_spdy_module,
+potentially resulting in arbitrary code execution
+(CVE-2014-0133).<br/>
+Thanks to Lucas Molas, researcher at Programa STIC, Fundación Dr. Manuel
+Sadosky, Buenos Aires, Argentina.
+</para>
+</change>
+
+<change type="bugfix">
+<para lang="ru">
+в директиве fastcgi_next_upstream.<br/>
+Спасибо Lucas Molas.
+</para>
+<para lang="en">
+in the "fastcgi_next_upstream" directive.<br/>
+Thanks to Lucas Molas.
+</para>
+</change>
+
+</changes>
+
+
 <changes ver="1.4.6" date="04.03.2014">
 
 <change type="bugfix">


More information about the nginx-devel mailing list