File _patchinfo of Package patchinfo.2264
<patchinfo>
<issue id="851295" tracker="bnc">VUL-0: CVE-2013-4547: nginx: security restriction bypass flaw due to whitespace parsing</issue>
<issue id="CVE-2013-4547" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>elvigia</packager>
<description>
The nginx webserver was fixed to avoid a restriction bypass when a space in not
correctly escaped. (CVE-2013-4547)
On openSUSE 12.2, nginx was updated to version 1.4.4 stable
* CVE-2013-4547 a character following an unescaped space
in a request line was handled incorrectly [bnc#851295]
* bugfix: segmentation fault might occur in the spdy module
* bugfix: segmentation fault might occur on start if
if the "try_files" directive was used with an empty
parameter.
</description>
<summary>nginx: fixed restriction bypass problem</summary>
</patchinfo>