The following security flaw in nginx was reported [1]: A bug in the experimental SPDY implementation in nginx 1.5.10 was found, which might allow an attacker to corrupt worker process memory by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0088). The problem only affects nginx 1.5.10 on 32-bit platforms, compiled with the ngx_http_spdy_module module (which is not compiled by default), if the "spdy" option of the "listen" directive is used in a configuration file. No Red Hat products, including Fedora and EPEL, ship this vulnerable version of nginx. [1] http://mailman.nginx.org/pipermail/nginx-announce/2014/000132.html