ubuntu/+source/nginx:applied/ubuntu/yakkety-security

Last commit made on 2017-07-13
Get this branch:
git clone -b applied/ubuntu/yakkety-security https://git.launchpad.net/ubuntu/+source/nginx
Members of Ubuntu Server Dev import team can upload to this branch. Log in for directions.

Branch merges

Branch information

Name:
applied/ubuntu/yakkety-security
Repository:
lp:ubuntu/+source/nginx

Recent commits

69c3842... by Steve Beattie on 2017-07-12

Import patches-applied version 1.10.1-0ubuntu1.3 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: cfe2366397c1b6e86f7ea2bf1c10762f51345b73
Unapplied parent: 4fec8558ade85a48539a22b62a02a0efc4e40523

New changelog entries:
  * SECURITY UPDATE: integer overflow in range filter leading to
    information exposure
    - debian/patches/CVE-2017-7529.patch: add check to ensure size does
      not overflow
    - CVE-2017-7529

4fec855... by Steve Beattie on 2017-07-12

Fix integer overflow in the range filter

Gbp-Pq: CVE-2017-7529.patch.

be17870... by Steve Beattie on 2017-07-12

Add Ubuntu token to NGINX_VER

Gbp-Pq: ubuntu-branding.patch.

148a55e... by Steve Beattie on 2017-07-12

Use linker flags from environment for perl (dpkg-buildflags).

Gbp-Pq: perl-use-dpkg-buildflags.patch.

731cf7e... by Steve Beattie on 2017-07-12

Import patches-unapplied version 1.10.1-0ubuntu1.3 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 11566cbf092f8ece359dc1b5efc26700f391487c

New changelog entries:
  * SECURITY UPDATE: integer overflow in range filter leading to
    information exposure
    - debian/patches/CVE-2017-7529.patch: add check to ensure size does
      not overflow
    - CVE-2017-7529

cfe2366... by Marc Deslauriers on 2016-10-27

Import patches-applied version 1.10.1-0ubuntu1.2 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 74b0ab08ebf5b5cc4c988c83a33f92abdfca5f35
Unapplied parent: 694e236c9ce7e5e3a72254fa24a14b664582885f

New changelog entries:
  * SECURITY REGRESSION: postinst upgrade failure (LP: #1637058)
    - debian/nginx-common.postinst: fix return code so script doesn't exit.

11566cb... by Marc Deslauriers on 2016-10-27

Import patches-unapplied version 1.10.1-0ubuntu1.2 to ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: 496c76442af0b99cf8a27f6c987dd7a9803079fb

New changelog entries:
  * SECURITY REGRESSION: postinst upgrade failure (LP: #1637058)
    - debian/nginx-common.postinst: fix return code so script doesn't exit.

694e236... by Marc Deslauriers on 2016-10-27

Add Ubuntu token to NGINX_VER

Gbp-Pq: ubuntu-branding.patch.

60376c9... by Marc Deslauriers on 2016-10-27

Use linker flags from environment for perl (dpkg-buildflags).

Gbp-Pq: perl-use-dpkg-buildflags.patch.

74b0ab0... by Marc Deslauriers on 2016-10-18

Import patches-applied version 1.10.1-0ubuntu1.1 to applied/ubuntu/yakkety-security

Imported using git-ubuntu import.

Changelog parent: c48c53d39ad59f1bc2c561b8a994e83e4b30db26
Unapplied parent: bf6ede290171d88626f4d23898c299ea028f588f

New changelog entries:
  [ Christos Trochalakis ]
  * debian/nginx-common.postinst:
    + Secure log file handling (owner & permissions) against privilege
      escalation attacks. /var/log/nginx is now owned by root:adm.
      Thanks Dawid Golunski (http://legalhackers.com) for the report.
      Changing /var/log/nginx permissions effectively reopens #701112,
      since log files can be world-readable. This is a trade-off until
      a better log opening solution is implemented upstream (trac:376).
  * debian/control:
    Don't allow building against liblua5.1-0-dev on architectures
    that libluajit is available.