Bugzilla – Bug 869076
VUL-0: CVE-2014-0133: nginx:heap-based buffer overflow in SPDY implementation
Last modified: 2015-02-19 04:16:19 UTC
CVE-2014-0133 A bug in the experimental SPDY implementation in nginx was found, which might allow an attacker to cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0133). The problem affects nginx 1.3.15 - 1.5.11, compiled with the ngx_http_spdy_module module (which is not compiled by default) and without --with-debug configure option, if the "spdy" option of the "listen" directive is used in a configuration file. The problem is fixed in nginx 1.5.12, 1.4.7. Upstream fix: http://nginx.org/download/patch.2014.spdy2.txt http://mailman.nginx.org/pipermail/nginx-announce/2014/000135.html
only openSUSE 13.1 affected apparently.
https://build.opensuse.org/request/show/226717
accepted
openSUSE-SU-2014:0450-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 869076 CVE References: CVE-2014-0133 Sources used: openSUSE 13.1 (src): nginx-1.4.7-3.9.1