[nginx] nginx-1.4.7-RELEASE
Maxim Dounin
mdounin at mdounin.ru
Tue Mar 18 16:40:42 UTC 2014
details: http://hg.nginx.org/nginx/rev/636ce03634e7
branches: stable-1.4
changeset: 5612:636ce03634e7
user: Maxim Dounin <mdounin at mdounin.ru>
date: Tue Mar 18 17:17:09 2014 +0400
description:
nginx-1.4.7-RELEASE
diffstat:
docs/xml/nginx/changes.xml | 35 +++++++++++++++++++++++++++++++++++
1 files changed, 35 insertions(+), 0 deletions(-)
diffs (45 lines):
diff --git a/docs/xml/nginx/changes.xml b/docs/xml/nginx/changes.xml
--- a/docs/xml/nginx/changes.xml
+++ b/docs/xml/nginx/changes.xml
@@ -5,6 +5,41 @@
<change_log title="nginx">
+<changes ver="1.4.7" date="18.03.2014">
+
+<change type="security">
+<para lang="ru">
+при обработке специально созданного запроса модулем ngx_http_spdy_module
+могло происходить переполнение буфера в рабочем процессе,
+что потенциально могло приводить к выполнению произвольного кода
+(CVE-2014-0133).<br/>
+Спасибо Lucas Molas из Programa STIC, Fundación Dr. Manuel
+Sadosky, Buenos Aires, Argentina.
+</para>
+<para lang="en">
+a heap memory buffer overflow might occur in a worker process
+while handling a specially crafted request by ngx_http_spdy_module,
+potentially resulting in arbitrary code execution
+(CVE-2014-0133).<br/>
+Thanks to Lucas Molas, researcher at Programa STIC, Fundación Dr. Manuel
+Sadosky, Buenos Aires, Argentina.
+</para>
+</change>
+
+<change type="bugfix">
+<para lang="ru">
+в директиве fastcgi_next_upstream.<br/>
+Спасибо Lucas Molas.
+</para>
+<para lang="en">
+in the "fastcgi_next_upstream" directive.<br/>
+Thanks to Lucas Molas.
+</para>
+</change>
+
+</changes>
+
+
<changes ver="1.4.6" date="04.03.2014">
<change type="bugfix">
More information about the nginx-devel
mailing list