*** This bug is a security vulnerability *** Public security bug reported:
This is CVE-2014-0133. This is Debian Bug 742059. ------ This was the nginx announcement of this issue: Hello! A bug in the experimental SPDY implementation in nginx was found, which might allow an attacker to cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0133). The problem affects nginx 1.3.15 - 1.5.11, compiled with the ngx_http_spdy_module module (which is not compiled by default) and without --with-debug configure option, if the "spdy" option of the "listen" directive is used in a configuration file. The problem is fixed in nginx 1.5.12, 1.4.7. Patch for the problem can be found here: http://nginx.org/download/patch.2014.spdy2.txt Thanks to Lucas Molas, researcher at Programa STIC, FundaciĆ³n Dr. Manuel Sadosky, Buenos Aires, Argentina. ------ Trusty and Saucy are affected. ** Affects: nginx (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: nginx (Debian) Importance: Unknown Status: Unknown ** Bug watch added: Debian Bug tracker #742059 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742059 ** Also affects: nginx (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742059 Importance: Unknown Status: Unknown ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0133 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nginx in Ubuntu. https://bugs.launchpad.net/bugs/1294280 Title: [CVE-2014-0133] SPDY Heap Buffer Overflow Vulnerability To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1294280/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs