It was discovered that an integer overflow existed in the range filter
feature of nginx. A remote attacker could use this to expose
sensitive information.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 17.04 | noarch | nginx-common | < 1.10.3-1ubuntu3.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libnginx-mod-http-auth-pam | < 1.10.3-1ubuntu3.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libnginx-mod-http-auth-pam-dbgsym | < 1.10.3-1ubuntu3.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libnginx-mod-http-cache-purge | < 1.10.3-1ubuntu3.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libnginx-mod-http-cache-purge-dbgsym | < 1.10.3-1ubuntu3.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libnginx-mod-http-dav-ext | < 1.10.3-1ubuntu3.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libnginx-mod-http-dav-ext-dbgsym | < 1.10.3-1ubuntu3.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libnginx-mod-http-echo | < 1.10.3-1ubuntu3.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libnginx-mod-http-echo-dbgsym | < 1.10.3-1ubuntu3.1 | UNKNOWN |
Ubuntu | 17.04 | noarch | libnginx-mod-http-fancyindex | < 1.10.3-1ubuntu3.1 | UNKNOWN |