[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1bzzDd-00006L-Bx@master.debian.org>
Date: Fri, 28 Oct 2016 04:56:41 +0000
From: Salvatore Bonaccorso <carnil@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 3701-2] nginx regression update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-3701-2 security@...ian.org
https://www.debian.org/security/ Salvatore Bonaccorso
October 28, 2016 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : nginx
Debian Bug : 842276
The update for nginx issued as DSA-3701-1 to address CVE-2016-1247
introduced a packaging issue, which prevents nginx from being
reinstalled or upgraded to a subsequent release. Updated packages are
now available to address this problem. For reference, the original
advisory text follows.
Dawid Golunski reported the nginx web server packages in Debian
suffered from a privilege escalation vulnerability (www-data to root)
due to the way log files are handled. This security update changes
ownership of the /var/log/nginx directory root. In addition,
/var/log/nginx has to be made accessible to local users, and local
users may be able to read the log files themselves local until the
next logrotate invocation.
For the stable distribution (jessie), this problem has been fixed in
version 1.6.2-5+deb8u4.
We recommend that you upgrade your nginx packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@...ts.debian.org
-----BEGIN PGP SIGNATURE-----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=zbTp
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists