Hello community,

here is the log from the commit of package patchinfo.2677 for 
openSUSE:13.1:Update checked in at 2014-03-26 16:51:50
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.1:Update/patchinfo.2677 (Old)
 and      /work/SRC/openSUSE:13.1:Update/.patchinfo.2677.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.2677"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="Update">
  <packager>aeneas_jaissle</packager>
  <issue tracker="cve" id="CVE-2014-0133"></issue>
  <issue tracker="bnc" id="869076">VUL-0: CVE-2014-0133: nginx:heap-based 
buffer overflow in SPDY implementation</issue>
  <category>security</category>
  <rating>moderate</rating>
  <summary>nginx: update to 1.4.7</summary>
  <description>nginx was updated to 1.4.7 to fix bugs and security issues.

Fixed security issues:
  * CVE-2014-0133: nginx:heap-based buffer overflow in SPDY implementation

New upstream release 1.4.7 (bnc#869076) (CVE-2014-0133)
    *) Security: a heap memory buffer overflow might occur in a worker
       process while handling a specially crafted request by
       ngx_http_spdy_module, potentially resulting in arbitrary code
       execution (CVE-2014-0133).
       Thanks to Lucas Molas, researcher at Programa STIC, Fundación Dr.
       Manuel Sadosky, Buenos Aires, Argentina.
    *) Bugfix: in the "fastcgi_next_upstream" directive.
       Thanks to Lucas Molas.
    *) Bugfix: the "client_max_body_size" directive might not work when
       reading a request body using chunked transfer encoding; the bug had
       appeared in 1.3.9.
       Thanks to Lucas Molas.
    *) Bugfix: a segmentation fault might occur in a worker process when
       proxying WebSocket connections.
    *) Bugfix: the $ssl_session_id variable contained full session
       serialized instead of just a session id.
       Thanks to Ivan Ristić.
    *) Bugfix: client connections might be immediately closed if deferred
       accept was used; the bug had appeared in 1.3.15.
    *) Bugfix: alerts "zero size buf in output" might appear in logs while
       proxying; the bug had appeared in 1.3.9.
    *) Bugfix: a segmentation fault might occur in a worker process if the
       ngx_http_spdy_module was used.
    *) Bugfix: proxied WebSocket connections might hang right after
       handshake if the select, poll, or /dev/poll methods were used.
    *) Bugfix: a timeout might occur while reading client request body in an
       SSL connection using chunked transfer encoding.
    *) Bugfix: memory leak in nginx/Windows.</description>
</patchinfo>
-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to