USN-3114-1: nginx vulnerability
25 October 2016
The system could be made to run programs as an administrator.
Releases
Packages
- nginx - small, powerful, scalable web/proxy server
Details
Dawid Golunski discovered that the nginx package incorrectly handled log
file permissions. A remote attacker could possibly use this issue to obtain
root privileges.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10
-
nginx-common
-
1.10.1-0ubuntu1.1
-
nginx-core
-
1.10.1-0ubuntu1.1
-
nginx-extras
-
1.10.1-0ubuntu1.1
-
nginx-full
-
1.10.1-0ubuntu1.1
-
nginx-light
-
1.10.1-0ubuntu1.1
Ubuntu 16.04
-
nginx-common
-
1.10.0-0ubuntu0.16.04.3
-
nginx-core
-
1.10.0-0ubuntu0.16.04.3
-
nginx-extras
-
1.10.0-0ubuntu0.16.04.3
-
nginx-full
-
1.10.0-0ubuntu0.16.04.3
-
nginx-light
-
1.10.0-0ubuntu0.16.04.3
Ubuntu 14.04
-
nginx-common
-
1.4.6-1ubuntu3.6
-
nginx-core
-
1.4.6-1ubuntu3.6
-
nginx-extras
-
1.4.6-1ubuntu3.6
-
nginx-full
-
1.4.6-1ubuntu3.6
-
nginx-light
-
1.4.6-1ubuntu3.6
In general, a standard system update will make all the necessary changes.