This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8258500034903416894==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="9Akh7m7S9Bwxq6hS0n7R8fuaBhX3jxKMi"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--9Akh7m7S9Bwxq6hS0n7R8fuaBhX3jxKMi
Content-Type: multipart/mixed; boundary="o60d5pK8bLg1ffF1QCwON3Rx88F3HadXL"
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <21efcc5f-314b-e36a-0fec-456fb3d6f874@canonical.com>
Subject: [USN-3114-1] nginx vulnerability
--o60d5pK8bLg1ffF1QCwON3Rx88F3HadXL
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable
==========================================================================
Ubuntu Security Notice USN-3114-1
October 25, 2016
nginx vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
The system could be made to run programs as an administrator.
Software Description:
- nginx: small, powerful, scalable web/proxy server
Details:
Dawid Golunski discovered that the nginx package incorrectly handled log
file permissions. A remote attacker could possibly use this issue to obtain
root privileges.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.10:
nginx-common 1.10.1-0ubuntu1.1
nginx-core 1.10.1-0ubuntu1.1
nginx-extras 1.10.1-0ubuntu1.1
nginx-full 1.10.1-0ubuntu1.1
nginx-light 1.10.1-0ubuntu1.1
Ubuntu 16.04 LTS:
nginx-common 1.10.0-0ubuntu0.16.04.3
nginx-core 1.10.0-0ubuntu0.16.04.3
nginx-extras 1.10.0-0ubuntu0.16.04.3
nginx-full 1.10.0-0ubuntu0.16.04.3
nginx-light 1.10.0-0ubuntu0.16.04.3
Ubuntu 14.04 LTS:
nginx-common 1.4.6-1ubuntu3.6
nginx-core 1.4.6-1ubuntu3.6
nginx-extras 1.4.6-1ubuntu3.6
nginx-full 1.4.6-1ubuntu3.6
nginx-light 1.4.6-1ubuntu3.6
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-3114-1
CVE-2016-1247
Package Information:
https://launchpad.net/ubuntu/+source/nginx/1.10.1-0ubuntu1.1
https://launchpad.net/ubuntu/+source/nginx/1.10.0-0ubuntu0.16.04.3
https://launchpad.net/ubuntu/+source/nginx/1.4.6-1ubuntu3.6
--o60d5pK8bLg1ffF1QCwON3Rx88F3HadXL--
--9Akh7m7S9Bwxq6hS0n7R8fuaBhX3jxKMi
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=Tyym
-----END PGP SIGNATURE-----
--9Akh7m7S9Bwxq6hS0n7R8fuaBhX3jxKMi--
--===============8258500034903416894==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============8258500034903416894==--
|