USN-3352-1: nginx vulnerability
13 July 2017
nginx could be made to expose sensitive information over the network.
Releases
Packages
- nginx - small, powerful, scalable web/proxy server
Details
It was discovered that an integer overflow existed in the range filter
feature of nginx. A remote attacker could use this to expose
sensitive information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.04
-
nginx-common
-
1.10.3-1ubuntu3.1
-
nginx-core
-
1.10.3-1ubuntu3.1
-
nginx-extras
-
1.10.3-1ubuntu3.1
-
nginx-full
-
1.10.3-1ubuntu3.1
-
nginx-light
-
1.10.3-1ubuntu3.1
Ubuntu 16.10
-
nginx-common
-
1.10.1-0ubuntu1.3
-
nginx-core
-
1.10.1-0ubuntu1.3
-
nginx-extras
-
1.10.1-0ubuntu1.3
-
nginx-full
-
1.10.1-0ubuntu1.3
-
nginx-light
-
1.10.1-0ubuntu1.3
Ubuntu 16.04
-
nginx-common
-
1.10.3-0ubuntu0.16.04.2
-
nginx-core
-
1.10.3-0ubuntu0.16.04.2
-
nginx-extras
-
1.10.3-0ubuntu0.16.04.2
-
nginx-full
-
1.10.3-0ubuntu0.16.04.2
-
nginx-light
-
1.10.3-0ubuntu0.16.04.2
Ubuntu 14.04
-
nginx-common
-
1.4.6-1ubuntu3.8
-
nginx-core
-
1.4.6-1ubuntu3.8
-
nginx-extras
-
1.4.6-1ubuntu3.8
-
nginx-full
-
1.4.6-1ubuntu3.8
-
nginx-light
-
1.4.6-1ubuntu3.8
In general, a standard system update will make all the necessary changes.