Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]
Groups > linux.debian.security > #4540
| From | Pierre Boesch <pierre@pboesch.fr> |
|---|---|
| Newsgroups | linux.debian.security |
| Subject | RE: [SECURITY] [DSA 3473-1] nginx security update |
| Date | 2016-02-16 14:30 +0100 |
| Message-ID | <r2NRv-8nd-3@gated-at.bofh.it> (permalink) |
| References | <r14D8-4iJ-9@gated-at.bofh.it> <r2NeO-7TR-17@gated-at.bofh.it> |
| Organization | linux.* mail to news gateway |
https://www.debian.org/MailingLists/unsubscribe Le 16/02/2016 13:22, Nicholas Brigden a écrit : > Bonjour, > > Comment puis-je faire pour me supprimer de la liste de diffusion de ces > e-mails ? > > Je n'en ai plus le besoin désormais ayant renoncé à entretenir un > serveur > web. > > D'avance merci pour votre aide. > > Meilleures salutations > Nicholas Brigden > > -----Message d'origine----- > De : Salvatore Bonaccorso [mailto:carnil@debian.org] > Envoyé : jeudi 11 février 2016 19:54 > À : debian-security-announce@lists.debian.org > Objet : [SECURITY] [DSA 3473-1] nginx security update > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > - > ------------------------------------------------------------------------- > Debian Security Advisory DSA-3473-1 > security@debian.org > https://www.debian.org/security/ Salvatore > Bonaccorso > February 11, 2016 > https://www.debian.org/security/faq > - > ------------------------------------------------------------------------- > > Package : nginx > CVE ID : CVE-2016-0742 CVE-2016-0746 CVE-2016-0747 > Debian Bug : 812806 > > Several vulnerabilities were discovered in the resolver in nginx, a > small, > powerful, scalable web/proxy server, leading to denial of service or, > potentially, to arbitrary code execution. These only affect nginx if > the > "resolver" directive is used in a configuration file. > > For the oldstable distribution (wheezy), these problems have been fixed > in > version 1.2.1-2.2+wheezy4. > > For the stable distribution (jessie), these problems have been fixed in > version 1.6.2-5+deb8u1. > > For the testing distribution (stretch), these problems have been fixed > in > version 1.9.10-1. > > For the unstable distribution (sid), these problems have been fixed in > version 1.9.10-1. > > We recommend that you upgrade your nginx packages. > > Further information about Debian Security Advisories, how to apply > these > updates to your system and frequently asked questions can be found at: > https://www.debian.org/security/ > > Mailing list: debian-security-announce@lists.debian.org > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1 > > iQIcBAEBCgAGBQJWvNjDAAoJEAVMuPMTQ89EYJYP+wRI0isi0yByVdJ2k7yHv6Gy > OMZQFi1OQYsVuKcSNBIrEMjLARosv9pWf7y7dEqOaePFE+IAsqaB5W4d7/9h7UTa > KTscUcdDr3et+gR3taTMQvO6oK8HqqVOmPZu+z4lkjyQjOX12mQFppRHtfSe3uuF > G073iAeRtf5OD4VXAcPUbYD2KGgVCm/dqkXBOF7uXQ+iHdI+YfEnBKwPH8ziWQyq > VVBWF4Gsd+W80b0EZaIXKeNb7me7irWdlsAOFueCjmBNhcOJbao3llQ4eDF4vvzD > AOVV+bq6jDoVY9OxRoRoUB8SFqLNfXspyICvuaJ4DDb0GSVMpoVpulz3fFT2BIF4 > PZlDw/pwbXbRog8vW8zgGmyMTpc98aGDASHIo+fZuEgXTSLnQIMMeuOjHnB0DPmb > lwOfY9wqnH3RDuvYKCOdbCDG0rRU3lApY+4pcRPMrbbseWUWevduLs289rzAdrTt > cdo8EgnPkBRdESyq09fgs2034LxUSLDByMwv61rvzYCzlwmvqSxX4tiyCYiywB5e > edA2xZthRca4V4v3OMaNFoal2fEeKMfC3IAFoHP4L7p35kSQMK8aTVfRvPKctAPo > xXp78jelIgn9IP7GZ48yPao4rdoEZXo1ojZspzK6eZuSVW7BsgAOotaCSmjevbTP > HG46YPDAFq9XmDt7BvEa > =//2q > -----END PGP SIGNATURE-----
Back to linux.debian.security | Previous | Next — Previous in thread | Next in thread | Find similar
RE: [SECURITY] [DSA 3473-1] nginx security update "Nicholas Brigden" <nico@leysard.com> - 2016-02-16 13:50 +0100
RE: [SECURITY] [DSA 3473-1] nginx security update Pierre Boesch <pierre@pboesch.fr> - 2016-02-16 14:30 +0100
RE: [SECURITY] [DSA 3473-1] nginx security update Orest <orest@paranoici.org> - 2016-02-16 14:50 +0100
csiph-web