Login
Newsletter
Werbung

Sicherheit: Zahlenüberlauf in nginx
Aktuelle Meldungen Distributionen
Name: Zahlenüberlauf in nginx
ID: USN-3352-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10, Ubuntu 17.04
Datum: Fr, 14. Juli 2017, 00:22
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7529
Applikationen: nginx

Originalnachricht


--===============6012417882486935536==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="8HhMLSHvAouSipEr"
Content-Disposition: inline


--8HhMLSHvAouSipEr
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3352-1
July 13, 2017

nginx vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

nginx could be made to expose sensitive information over the network.

Software Description:
- nginx: small, powerful, scalable web/proxy server

Details:

It was discovered that an integer overflow existed in the range
filter feature of nginx. A remote attacker could use this to expose
sensitive information.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
nginx-common 1.10.3-1ubuntu3.1
nginx-core 1.10.3-1ubuntu3.1
nginx-extras 1.10.3-1ubuntu3.1
nginx-full 1.10.3-1ubuntu3.1
nginx-light 1.10.3-1ubuntu3.1

Ubuntu 16.10:
nginx-common 1.10.1-0ubuntu1.3
nginx-core 1.10.1-0ubuntu1.3
nginx-extras 1.10.1-0ubuntu1.3
nginx-full 1.10.1-0ubuntu1.3
nginx-light 1.10.1-0ubuntu1.3

Ubuntu 16.04 LTS:
nginx-common 1.10.3-0ubuntu0.16.04.2
nginx-core 1.10.3-0ubuntu0.16.04.2
nginx-extras 1.10.3-0ubuntu0.16.04.2
nginx-full 1.10.3-0ubuntu0.16.04.2
nginx-light 1.10.3-0ubuntu0.16.04.2

Ubuntu 14.04 LTS:
nginx-common 1.4.6-1ubuntu3.8
nginx-core 1.4.6-1ubuntu3.8
nginx-extras 1.4.6-1ubuntu3.8
nginx-full 1.4.6-1ubuntu3.8
nginx-light 1.4.6-1ubuntu3.8

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3352-1
CVE-2017-7529

Package Information:
https://launchpad.net/ubuntu/+source/nginx/1.10.3-1ubuntu3.1
https://launchpad.net/ubuntu/+source/nginx/1.10.1-0ubuntu1.3
https://launchpad.net/ubuntu/+source/nginx/1.10.3-0ubuntu0.16.04.2
https://launchpad.net/ubuntu/+source/nginx/1.4.6-1ubuntu3.8


--8HhMLSHvAouSipEr
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=AeN4
-----END PGP SIGNATURE-----

--8HhMLSHvAouSipEr--


--===============6012417882486935536==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============6012417882486935536==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung