[arch-security] [ASA-201707-12] nginx-mainline: information disclosure
rgacogne at archlinux.org
Wed Jul 12 14:43:47 UTC 2017
Arch Linux Security Advisory ASA-201707-12
Date : 2017-07-12
CVE-ID : CVE-2017-7529
Package : nginx-mainline
Type : information disclosure
Remote : Yes
Link : https://security.archlinux.org/AVG-346
The package nginx-mainline before version 1.13.3-1 is vulnerable to
Upgrade to 1.13.3-1.
# pacman -Syu "nginx-mainline>=1.13.3-1"
The problem has been fixed upstream in version 1.13.3.
A security issue was identified in the range filter module of nginx <
1.13.3. A specially crafted request might result in an integer overflow
and incorrect processing of ranges, potentially resulting in sensitive
When using nginx with standard modules this allows an attacker to
obtain a cache file header if a response was returned from cache. In
some configurations a cache file header may contain IP address of the
backend server or other sensitive information. Besides, with 3rd party
modules it is potentially possible that the issue may lead to a denial
of service or a disclosure of a worker process memory. No such modules
are currently known though.
A remote attacker can access sensitive information by sending a
specially crafted request.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the arch-security