diff -Nru nginx-1.4.1/debian/changelog nginx-1.4.1/debian/changelog --- nginx-1.4.1/debian/changelog 2013-06-20 10:08:47.000000000 -0400 +++ nginx-1.4.1/debian/changelog 2013-11-21 13:28:22.000000000 -0500 @@ -1,3 +1,11 @@ +nginx (1.4.1-3ubuntu1.1) saucy-security; urgency=low + + * Security update (closes LP: #1253691): + * Patch to fix an issue which could result in security restrictions being + bypassed (CVE-2013-4547) + + -- Thomas Ward Thu, 21 Nov 2013 13:27:20 -0500 + nginx (1.4.1-3ubuntu1) saucy; urgency=low * Resynchronise with Debian. Remaining changes: diff -Nru nginx-1.4.1/debian/patches/cve-2013-4547.patch nginx-1.4.1/debian/patches/cve-2013-4547.patch --- nginx-1.4.1/debian/patches/cve-2013-4547.patch 1969-12-31 19:00:00.000000000 -0500 +++ nginx-1.4.1/debian/patches/cve-2013-4547.patch 2013-11-21 13:26:58.000000000 -0500 @@ -0,0 +1,21 @@ +Description: CVE-2013-4547 - Fix an issue in which an attacker may be able to bypass security restrictions on certain configurations with specially crafted requests. +Origin: upstream http://nginx.org/download/patch.2013.space.txt +Bug-Ubuntu: https://bugs.launchpad.net/bugs/1253691 +--- a/src/http/ngx_http_parse.c ++++ b/src/http/ngx_http_parse.c +@@ -617,6 +617,7 @@ ngx_http_parse_request_line(ngx_http_req + default: + r->space_in_uri = 1; + state = sw_check_uri; ++ p--; + break; + } + break; +@@ -670,6 +671,7 @@ ngx_http_parse_request_line(ngx_http_req + default: + r->space_in_uri = 1; + state = sw_uri; ++ p--; + break; + } + break; diff -Nru nginx-1.4.1/debian/patches/series nginx-1.4.1/debian/patches/series --- nginx-1.4.1/debian/patches/series 2013-06-20 10:08:02.000000000 -0400 +++ nginx-1.4.1/debian/patches/series 2013-11-21 13:26:58.000000000 -0500 @@ -1,2 +1,3 @@ perl-use-dpkg-buildflags.patch ubuntu-branding.patch +cve-2013-4547.patch