*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: nginx

The release on 2009-09-14 contains a buffer underflow fix.  Unpatched
servers may be vulnerable to DoS or arbitrary code execution.

http://nginx.net/CHANGES-0.6

A fix has been applied to Debian packages. please update the Ubuntu
packages to the latest code, or backport the fix.

- --------------------------------------------------------------------------
Debian Security Advisory DSA-1884-1                    secur...@debian.org
http://www.debian.org/security/                                 Nico Golde
September 14th, 2009                    http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : nginx
Vulnerability  : buffer underflow
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2009-2629

Chris Ries discovered that nginx, a high-performance HTTP server, reverse
proxy and IMAP/POP3 proxy server, is vulnerable to a buffer underflow when
processing certain HTTP requests.  An attacker can use this to execute
arbitrary code with the rights of the worker process (www-data on Debian)
or possibly perform denial of service attacks by repeatedly crashing
worker processes via a specially crafted URL in an HTTP request.


For the oldstable distribution (etch), this problem has been fixed in
version 0.4.13-2+etch2.

For the stable distribution (lenny), this problem has been fixed in
version 0.6.32-3+lenny2.

For the testing distribution (squeeze), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in
version 0.7.61-3.

** Affects: nginx (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

-- 
Security fix in recent release 0.6.39/DSA-1884-1
https://bugs.launchpad.net/bugs/430064
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to