Upstream [1] reports: ... A bug in nginx SMTP proxy was found, which allows an attacker in a privileged network position to inject commands into SSL sessions started with the STARTTLS command, potentially making it possible to steal sensitive information sent by clients (CVE-2014-3556). The problem affects nginx 1.5.6 - 1.7.3. The problem is fixed in nginx 1.7.4, 1.6.1. Patch for the problem can be found here: http://nginx.org/download/patch.2014.starttls.txt [1]: http://mailman.nginx.org/pipermail/nginx-announce/2014/000144.html
Created nginx tracking bugs for this issue: Affects: epel-7 [bug 1126892]
Statement: This issue did not affect the versions of nginx as shipped with Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 and 7.
nginx 1.6 is in Fedora 21 / Rawhide. Update to version 1.6.1 was already built by the maintainer.
This is now fixed?
Hi! I suppose it's fixed in 1.6.x because there is a stable version (nginx-1.6.2-4.fc21) and "* Tue Aug 05 2014 Jamie Nguyen <jamielinux> - 1:1.6.1-1 - update to upstream release 1.6.1 - (#1126891) CVE-2014-3556: SMTP STARTTLS plaintext injection flaw" Can we close this issue?
(In reply to Peter Borsa from comment #7) > Hi! > > I suppose it's fixed in 1.6.x because there is a stable version > (nginx-1.6.2-4.fc21) and > > "* Tue Aug 05 2014 Jamie Nguyen <jamielinux> - 1:1.6.1-1 > - update to upstream release 1.6.1 > - (#1126891) CVE-2014-3556: SMTP STARTTLS plaintext injection flaw" > > Can we close this issue? Yep, based on the status of the bugs in "Depends On" field marking this CLOSED/ERRATA.