Groups | Search | Server Info | Keyboard shortcuts | Login | Register [http] [https] [nntp] [nntps]


Groups > linux.debian.security > #4540

RE: [SECURITY] [DSA 3473-1] nginx security update

From Pierre Boesch <pierre@pboesch.fr>
Newsgroups linux.debian.security
Subject RE: [SECURITY] [DSA 3473-1] nginx security update
Date 2016-02-16 14:30 +0100
Message-ID <r2NRv-8nd-3@gated-at.bofh.it> (permalink)
References <r14D8-4iJ-9@gated-at.bofh.it> <r2NeO-7TR-17@gated-at.bofh.it>
Organization linux.* mail to news gateway

Show all headers | View raw


https://www.debian.org/MailingLists/unsubscribe


Le 16/02/2016 13:22, Nicholas Brigden a écrit :
> Bonjour,
> 
> Comment puis-je faire pour me supprimer de la liste de diffusion de ces
> e-mails ?
> 
> Je n'en ai plus le besoin désormais ayant renoncé à entretenir un 
> serveur
> web.
> 
> D'avance merci pour votre aide.
> 
> Meilleures salutations
> Nicholas Brigden
> 
> -----Message d'origine-----
> De : Salvatore Bonaccorso [mailto:carnil@debian.org]
> Envoyé : jeudi 11 février 2016 19:54
> À : debian-security-announce@lists.debian.org
> Objet : [SECURITY] [DSA 3473-1] nginx security update
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
> 
> - 
> -------------------------------------------------------------------------
> Debian Security Advisory DSA-3473-1                   
> security@debian.org
> https://www.debian.org/security/                     Salvatore 
> Bonaccorso
> February 11, 2016                     
> https://www.debian.org/security/faq
> - 
> -------------------------------------------------------------------------
> 
> Package        : nginx
> CVE ID         : CVE-2016-0742 CVE-2016-0746 CVE-2016-0747
> Debian Bug     : 812806
> 
> Several vulnerabilities were discovered in the resolver in nginx, a 
> small,
> powerful, scalable web/proxy server, leading to denial of service or,
> potentially, to arbitrary code execution. These only affect nginx if 
> the
> "resolver" directive is used in a configuration file.
> 
> For the oldstable distribution (wheezy), these problems have been fixed 
> in
> version 1.2.1-2.2+wheezy4.
> 
> For the stable distribution (jessie), these problems have been fixed in
> version 1.6.2-5+deb8u1.
> 
> For the testing distribution (stretch), these problems have been fixed 
> in
> version 1.9.10-1.
> 
> For the unstable distribution (sid), these problems have been fixed in
> version 1.9.10-1.
> 
> We recommend that you upgrade your nginx packages.
> 
> Further information about Debian Security Advisories, how to apply 
> these
> updates to your system and frequently asked questions can be found at:
> https://www.debian.org/security/
> 
> Mailing list: debian-security-announce@lists.debian.org
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1
> 
> iQIcBAEBCgAGBQJWvNjDAAoJEAVMuPMTQ89EYJYP+wRI0isi0yByVdJ2k7yHv6Gy
> OMZQFi1OQYsVuKcSNBIrEMjLARosv9pWf7y7dEqOaePFE+IAsqaB5W4d7/9h7UTa
> KTscUcdDr3et+gR3taTMQvO6oK8HqqVOmPZu+z4lkjyQjOX12mQFppRHtfSe3uuF
> G073iAeRtf5OD4VXAcPUbYD2KGgVCm/dqkXBOF7uXQ+iHdI+YfEnBKwPH8ziWQyq
> VVBWF4Gsd+W80b0EZaIXKeNb7me7irWdlsAOFueCjmBNhcOJbao3llQ4eDF4vvzD
> AOVV+bq6jDoVY9OxRoRoUB8SFqLNfXspyICvuaJ4DDb0GSVMpoVpulz3fFT2BIF4
> PZlDw/pwbXbRog8vW8zgGmyMTpc98aGDASHIo+fZuEgXTSLnQIMMeuOjHnB0DPmb
> lwOfY9wqnH3RDuvYKCOdbCDG0rRU3lApY+4pcRPMrbbseWUWevduLs289rzAdrTt
> cdo8EgnPkBRdESyq09fgs2034LxUSLDByMwv61rvzYCzlwmvqSxX4tiyCYiywB5e
> edA2xZthRca4V4v3OMaNFoal2fEeKMfC3IAFoHP4L7p35kSQMK8aTVfRvPKctAPo
> xXp78jelIgn9IP7GZ48yPao4rdoEZXo1ojZspzK6eZuSVW7BsgAOotaCSmjevbTP
> HG46YPDAFq9XmDt7BvEa
> =//2q
> -----END PGP SIGNATURE-----

Back to linux.debian.security | Previous | NextPrevious in thread | Next in thread | Find similar


Thread

RE: [SECURITY] [DSA 3473-1] nginx security update "Nicholas Brigden" <nico@leysard.com> - 2016-02-16 13:50 +0100
  RE: [SECURITY] [DSA 3473-1] nginx security update Pierre Boesch <pierre@pboesch.fr> - 2016-02-16 14:30 +0100
    RE: [SECURITY] [DSA 3473-1] nginx security update Orest <orest@paranoici.org> - 2016-02-16 14:50 +0100

csiph-web