nginxtra 1.4.6.9 → 1.4.7.9

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: bdbeda6e5a02b626fc9df0916df9c726d3e2b9e3
4
- data.tar.gz: 0922b841d5cfc95041231b5c830d24b0b64f8af0
3
+ metadata.gz: dede1bae30a3fd005accbd97949b0976bba4ce15
4
+ data.tar.gz: 350606d60ba2e59448b0e8352af765ba55208875
5
5
  SHA512:
6
- metadata.gz: ffa65627a8944545dbd6c32e523807f5822d25c9035b68f1d2cee5f7fa1835dc906eb3d38383a6fa58443842a89b6ca69fbd7707a77f0afb5426f91cd859ca2e
7
- data.tar.gz: cf43b5f3026eeb525048f6ecd54f1c50ff7003e250eb457b087cb1498c8b596324dd7ab21c35c8a9098d78c45b84ccbdc057b015d4223e054f2f4ae82236518f
6
+ metadata.gz: d735aafa03c117c1c18dd17dae8d5e7737b8c7ca884b1ee389389617f47dafeb43db6cb7b688a838167d9fcce931f7a79a396f300adacd96d63bd1dc1701d2bf
7
+ data.tar.gz: e5b167bda73982d95c86c4cecab947f2ea791ff2ed34d2bfde12a99d203ec28bf88ee90867d576f7efa3f61a76fd04e132563e0b4d2eed30e7945baf4e02b000
data/bin/nginxtra CHANGED
@@ -1,6 +1,6 @@
1
1
  #!/usr/bin/env ruby
2
2
  require "rubygems"
3
- gem "nginxtra", "= 1.4.6.9"
3
+ gem "nginxtra", "= 1.4.7.9"
4
4
  gem "thor", "~> 0.16"
5
5
  require "nginxtra"
6
6
  Nginxtra::CLI.start
data/bin/nginxtra_rails CHANGED
@@ -1,6 +1,6 @@
1
1
  #!/usr/bin/env ruby
2
2
  require "rubygems"
3
- gem "nginxtra", "= 1.4.6.9"
3
+ gem "nginxtra", "= 1.4.7.9"
4
4
  gem "thor", "~> 0.16"
5
5
  require "nginxtra"
6
6
  Nginxtra::Rails::CLI.start
@@ -6,7 +6,7 @@ module Nginxtra
6
6
  end
7
7
 
8
8
  def to_s
9
- "1.4.6.9"
9
+ "1.4.7.9"
10
10
  end
11
11
  end
12
12
  end
data/vendor/nginx/CHANGES CHANGED
@@ -1,4 +1,17 @@
1
1
 
2
+ Changes with nginx 1.4.7 18 Mar 2014
3
+
4
+ *) Security: a heap memory buffer overflow might occur in a worker
5
+ process while handling a specially crafted request by
6
+ ngx_http_spdy_module, potentially resulting in arbitrary code
7
+ execution (CVE-2014-0133).
8
+ Thanks to Lucas Molas, researcher at Programa STIC, Fundación Dr.
9
+ Manuel Sadosky, Buenos Aires, Argentina.
10
+
11
+ *) Bugfix: in the "fastcgi_next_upstream" directive.
12
+ Thanks to Lucas Molas.
13
+
14
+
2
15
  Changes with nginx 1.4.6 04 Mar 2014
3
16
 
4
17
  *) Bugfix: the "client_max_body_size" directive might not work when
@@ -1,4 +1,17 @@
1
1
 
2
+ Изменения в nginx 1.4.7 18.03.2014
3
+
4
+ *) Безопасность: при обработке специально созданного запроса модулем
5
+ ngx_http_spdy_module могло происходить переполнение буфера в рабочем
6
+ процессе, что потенциально могло приводить к выполнению произвольного
7
+ кода (CVE-2014-0133).
8
+ Спасибо Lucas Molas из Programa STIC, Fundación Dr. Manuel Sadosky,
9
+ Buenos Aires, Argentina.
10
+
11
+ *) Исправление: в директиве fastcgi_next_upstream.
12
+ Спасибо Lucas Molas.
13
+
14
+
2
15
  Изменения в nginx 1.4.6 04.03.2014
3
16
 
4
17
  *) Исправление: директива client_max_body_size могла не работать при
@@ -9,8 +9,8 @@
9
9
  #define _NGINX_H_INCLUDED_
10
10
 
11
11
 
12
- #define nginx_version 1004006
13
- #define NGINX_VERSION "1.4.6"
12
+ #define nginx_version 1004007
13
+ #define NGINX_VERSION "1.4.7"
14
14
  #define NGINX_VER "nginx/" NGINX_VERSION
15
15
 
16
16
  #define NGINX_VAR "NGINX"
@@ -1195,6 +1195,10 @@ ngx_http_fastcgi_reinit_request(ngx_http_request_t *r)
1195
1195
  f->fastcgi_stdout = 0;
1196
1196
  f->large_stderr = 0;
1197
1197
 
1198
+ if (f->split_parts) {
1199
+ f->split_parts->nelts = 0;
1200
+ }
1201
+
1198
1202
  r->state = 0;
1199
1203
 
1200
1204
  return NGX_OK;
@@ -1475,6 +1479,13 @@ ngx_http_fastcgi_process_header(ngx_http_request_t *r)
1475
1479
 
1476
1480
  rc = ngx_http_parse_header_line(r, &buf, 1);
1477
1481
 
1482
+ if (rc != NGX_OK) {
1483
+ ngx_log_error(NGX_LOG_ALERT, r->connection->log, 0,
1484
+ "invalid header after joining "
1485
+ "FastCGI records");
1486
+ return NGX_ERROR;
1487
+ }
1488
+
1478
1489
  h->key.len = r->header_name_end - r->header_name_start;
1479
1490
  h->key.data = r->header_name_start;
1480
1491
  h->key.data[h->key.len] = '\0';
@@ -1465,7 +1465,7 @@ static u_char *
1465
1465
  ngx_http_spdy_state_save(ngx_http_spdy_connection_t *sc,
1466
1466
  u_char *pos, u_char *end, ngx_http_spdy_handler_pt handler)
1467
1467
  {
1468
- #if (NGX_DEBUG)
1468
+ #if 1
1469
1469
  if (end - pos > NGX_SPDY_STATE_BUFFER_SIZE) {
1470
1470
  ngx_log_error(NGX_LOG_ALERT, sc->connection->log, 0,
1471
1471
  "spdy state buffer overflow: "
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: nginxtra
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.4.6.9
4
+ version: 1.4.7.9
5
5
  platform: ruby
6
6
  authors:
7
7
  - Mike Virata-Stone
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2014-03-05 00:00:00.000000000 Z
11
+ date: 2014-03-19 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: thor