Return to errata53.html CVS log | Up to [local] / www |
version 1.6, 2013/05/17 13:49:15 | version 1.7, 2013/05/20 18:51:29 | ||
---|---|---|---|
|
|
||
<li><a name="003_nginx"></a> | <li><a name="003_nginx"></a> | ||
<font color="#009000"><strong>003: RELIABILITY FIX: May 17, 2013</strong></font> <i>All architectures</i><br> | <font color="#009000"><strong>003: RELIABILITY FIX: May 17, 2013</strong></font> <i>All architectures</i><br> | ||
A stack-based buffer overflow might occur in an | A problem exists in | ||
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=nginx&sektion=8">nginx(8)</a> | <a href="http://www.openbsd.org/cgi-bin/man.cgi?query=nginx&sektion=8">nginx(8)</a> | ||
worker process while handling a specially crafted request, potentially resulting in arbitrary code | if proxy_pass is used with untrusted HTTP backend servers. | ||
execution. This issue was assigned CVE-2013-2070. | The problem may lead to a denial of service or a disclosure of a | ||
worker process memory on a specially crafted response from an | |||
upstream proxied server. | |||
This issue was assigned CVE-2013-2070. | |||
<br> | <br> | ||
<a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/003_nginx.patch"> | <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.3/common/003_nginx.patch"> | ||
A source code patch exists which remedies this problem</a>.<br> | A source code patch exists which remedies this problem</a>.<br> |