==========================================================================
Ubuntu Security Notice USN-3352-1
July 13, 2017
nginx vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
nginx could be made to expose sensitive information over the network.
Software Description:
– nginx: small, powerful, scalable web/proxy server
Details:
It was discovered that an integer overflow existed in the range
filter feature of nginx. A remote attacker could use this to expose
sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
nginx-common 1.10.3-1ubuntu3.1
nginx-core 1.10.3-1ubuntu3.1
nginx-extras 1.10.3-1ubuntu3.1
nginx-full 1.10.3-1ubuntu3.1
nginx-light 1.10.3-1ubuntu3.1
Ubuntu 16.10:
nginx-common 1.10.1-0ubuntu1.3
nginx-core 1.10.1-0ubuntu1.3
nginx-extras 1.10.1-0ubuntu1.3
nginx-full 1.10.1-0ubuntu1.3
nginx-light 1.10.1-0ubuntu1.3
Ubuntu 16.04 LTS:
nginx-common 1.10.3-0ubuntu0.16.04.2
nginx-core 1.10.3-0ubuntu0.16.04.2
nginx-extras 1.10.3-0ubuntu0.16.04.2
nginx-full 1.10.3-0ubuntu0.16.04.2
nginx-light 1.10.3-0ubuntu0.16.04.2
Ubuntu 14.04 LTS:
nginx-common 1.4.6-1ubuntu3.8
nginx-core 1.4.6-1ubuntu3.8
nginx-extras 1.4.6-1ubuntu3.8
nginx-full 1.4.6-1ubuntu3.8
nginx-light 1.4.6-1ubuntu3.8
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3352-1
CVE-2017-7529
Package Information:
https://launchpad.net/ubuntu/+source/nginx/1.10.3-1ubuntu3.1
https://launchpad.net/ubuntu/+source/nginx/1.10.1-0ubuntu1.3
https://launchpad.net/ubuntu/+source/nginx/1.10.3-0ubuntu0.16.04.2
https://launchpad.net/ubuntu/+source/nginx/1.4.6-1ubuntu3.8
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=AeN4
—–END PGP SIGNATURE—–
—