Bug 1077988 (CVE-2014-0133)
Summary: | CVE-2014-0133 nginx: heap-based buffer overflow in SPDY implementation | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Murray McAllister <mmcallis> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED NOTABUG | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | affix, athmanem, jeremy, pavel.lisy, peter.borsa, vdanen |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | nginx 1.4.7 nginx 1.5.12 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-03-19 09:43:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1077989 |
Description
Murray McAllister
2014-03-19 03:42:39 UTC
This issue does not affect the version of nginx as shipped with Fedora 19 and Fedora 20. This issue does not affect the version of nginx as shipped with EPEL 5 and EPEL 6. |