nginx: Arbitrary code execution — GLSA 201406-20

A vulnerability has been found in nginx which may allow execution of arbitrary code.

Affected packages

www-servers/nginx on all architectures
Affected versions < 1.4.7
Unaffected versions >= 1.4.7

Background

nginx is a robust, small, and high performance HTTP and reverse proxy server.

Description

A bug in the SPDY implementation in nginx was found which might cause a heap memory buffer overflow in a worker process by using a specially crafted request. The SPDY implementation is not enabled in default configurations.

Impact

A remote attacker could cause execution of arbitrary code by using a specially crafted request.

Workaround

Disable the spdy module in NGINX_MODULES_HTTP.

Resolution

All nginx users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-servers/nginx-1.4.7"
 

References

Release date
June 22, 2014

Latest revision
June 22, 2014: 1

Severity
normal

Exploitable
remote

Bugzilla entries