Commit graph

579 commits

Author SHA1 Message Date
Christos Trochalakis
a2e1aba7a5 Release 1.10.3-1+deb9u3 2019-08-19 12:32:31 +03:00
Christos Trochalakis
312dd9143d Handle CVE-2019-9511 CVE-2019-9513 CVE-2019-9516
Several security issues were identified in nginx HTTP/2
implementation, which might cause excessive memory consumption
and CPU usage (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516).

The issues affect nginx compiled with the ngx_http_v2_module (not
compiled by default) if the "http2" option of the "listen" directive
is used in a configuration file.

The issues affect nginx 1.9.5 - 1.17.2.
The issues are fixed in nginx 1.17.3, 1.16.1.

Thanks to Jonathan Looney from Netflix for discovering these issues.

Adjusted for Nginx 1.10
2019-08-19 12:30:51 +03:00
Christos Trochalakis
39217fc418 Release 1.10.3-1+deb9u2 2018-11-08 07:13:57 +02:00
Christos Trochalakis
49e296609d Handle CVE-2018-16843 CVE-2018-16844 CVE-2018-16845
CVE-2018-16843 CVE-2018-16844
=============================

Two security issues were identified in nginx HTTP/2 implementation,
which might cause excessive memory consumption (CVE-2018-16843)
and CPU usage (CVE-2018-16844).

The issues affect nginx compiled with the ngx_http_v2_module (not
compiled by default) if the "http2" option of the "listen" directive is
used in a configuration file.

The issues affects nginx 1.9.5 - 1.15.5.

To mitigate CVE-2018-16844 the http2_max_requests was also backported
from 1.14.
To mitigate CVE-2018-16843 the allocated frames has to be checked in
ngx_http_v2_send_settings() as well since SETTINGS frames are handled
separately before 1.13.2 (http://hg.nginx.org/nginx/rev/79de0d2aa432)
Thanks to Nginx's Maxim Dounin for his help.

CVE-2018-16845
==============

A security issue was identified in the ngx_http_mp4_module, which might
allow an attacker to cause infinite loop in a worker process, cause a
worker process crash, or might result in worker process memory
disclosure by using a specially crafted mp4 file (CVE-2018-16845).

The issue only affects nginx if it is built with the ngx_http_mp4_module
(the module is not built by default) and the "mp4" directive is used in
the configuration file.  Further, the attack is only possible if an
attacker is able to trigger processing of a specially crafted mp4 file
with the ngx_http_mp4_module.

The issue affects nginx 1.1.3+, 1.0.7+.
2018-11-08 07:13:57 +02:00
Christos Trochalakis
b8e51f2a11 gbp: setup for stretch
Gbp-Dch: Ignore
2018-11-07 08:52:14 +02:00
Christos Trochalakis
fdd7e0ed32 Release 1.10.3-1+deb9u1 2017-07-12 10:47:57 +03:00
Christos Trochalakis
ee65e876ac Handle CVE-2017-7529 Integer overflow in the range filter
A security issue was identified in nginx range filter.  A specially
crafted request might result in an integer overflow and incorrect
processing of ranges, potentially resulting in sensitive information
leak (CVE-2017-7529).

When using nginx with standard modules this allows an attacker to
obtain a cache file header if a response was returned from cache.
In some configurations a cache file header may contain IP address
of the backend server or other sensitive information.

Besides, with 3rd party modules it is potentially possible that
the issue may lead to a denial of service or a disclosure of
a worker process memory.  No such modules are currently known though.

The issue affects nginx 0.5.6 - 1.13.2.
The issue is fixed in nginx 1.13.3, 1.12.1.

For older versions, the following configuration can be used
as a temporary workaround:

    max_ranges 1;

See http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html

Closes: #868109
2017-07-12 08:40:52 +03:00
Christos Trochalakis
0868325b3a Release 1.10.3-1 2017-02-15 11:01:39 +02:00
Christos Trochalakis
d92573efb6 Move Vcs repo under pkg-nginx 2017-02-15 10:00:10 +02:00
Christos Trochalakis
e1f1837732 Merge tag 'upstream/1.10.3' into stretch
Upstream version 1.10.3
2017-02-15 09:59:56 +02:00
Christos Trochalakis
06d2f43f67 New upstream version 1.10.3 2017-01-31 19:29:29 +02:00
Christos Trochalakis
df46fe3e59 Release 1.10.2-4 2017-01-22 12:50:54 +02:00
Christos Trochalakis
db5edb9e3c Enable modules after a remove -> install cycle
Previously a module that was removed (not purged) and then reinstalled
did not enable itself causing some confusion. Now, we maintain state by
moving the module symlink to .removed on package removal.

If the package is reinstalled the link is restored, if purged the link
is completely dropped.
2017-01-22 12:50:54 +02:00
Christos Trochalakis
12b7091e96 Switch module reloading logic to dpkg triggers
Fixes issues during upgrades from non dynamic nginx versions (jessie).

When multiple modules are installed together for the first time,
nginx reload might fail because, at that time, the configuration
might reference directives provided by module packages that are
not yet configured.

There are also other cases where the instant reload might break,
using triggers seems like the correct way to proceed.
2017-01-22 12:50:54 +02:00
Christos Trochalakis
a9504afcbe Move module patches to debian/modules/patches
Everything under debian/patches has a special meaning in various tools
like gbp-pq.
2017-01-22 12:50:54 +02:00
Christos Trochalakis
cabaec36db d/control: Rename LUA to Lua
Fixes lintian capitalization-error-in-description-synopsis.

Gbp-Dch: Ignore
2017-01-21 22:57:23 +02:00
Christos Trochalakis
72cbf89d57 Drop lua reference from libnginx-mod-http-ndk description
Gbp-Dch: Ignore
2017-01-21 22:57:23 +02:00
Christos Trochalakis
6672c479d6 Add a NEWS entry regarding dynamic modules 2017-01-21 22:41:52 +02:00
Christos Trochalakis
110e1a49c2 Add some tests for X25519 EC
Gbp-Dch: Ignore
2017-01-11 15:16:32 +02:00
Christos Trochalakis
23e4b6d076 Backport curve list support from 1.11.x mainline
As a side-effect we move away from EC_KEY* OpenSSL API
in favor of `SSL_CTX_set1_curves_list()` which supports
X25519.

Also, the default curve changed from prime256v1, to the
OpenSSL defaults (currently X25519).

See also:
https://mta.openssl.org/pipermail/openssl-dev/2016-October/008582.html

Closes: #846085
2017-01-11 15:16:32 +02:00
Christos Trochalakis
1d0e6f6d38 Merge da translation
Thanks: Joe Dalton
Closes: #850857
2017-01-11 11:46:22 +02:00
Christos Trochalakis
ead0bdc4f3 Merge pt_BR translation
Thanks: Adriano Rafael Gomes
Closes: #846522
2017-01-11 11:46:22 +02:00
Christos Trochalakis
4dacd5cfa0 Merge nl translation
Thanks: Frans Spiesschaert
Closes: #845693
2017-01-11 11:46:21 +02:00
Christos Trochalakis
58a0ed368a Merge fr translation
Thanks: Julien Patriarca
Closes: #844712
2017-01-11 11:46:21 +02:00
Christos Trochalakis
006a1d393f Merge de translation
Thanks: Chris Leick
Closes: #843770
2017-01-11 11:46:00 +02:00
Christos Trochalakis
34f973d82f Release 1.10.2-3 2016-12-24 12:12:51 +02:00
Christos Trochalakis
c9d02dd9d6 mod: Upgrade development kit to 0.3.0 2016-12-24 12:09:17 +02:00
Christos Trochalakis
e5ea352290 mod: Upgrade headers-mode to 0.32 2016-12-24 12:09:17 +02:00
Christos Trochalakis
e8f81d1ad0 mod: Check if nginx binary exists before reloading
Since the modules don't depend on nginx binary packages
yet, there are some edge cases that /run/nginx.pid is not empty
and /usr/sbin/nginx doesn't exist.
2016-12-24 12:09:14 +02:00
Christos Trochalakis
add52334d1 Reactivate PIE
Thanks: Markus Waldeck for the suggestion
2016-12-24 12:09:12 +02:00
Christos Trochalakis
07702e95f9 Update nginx-lua OpenSSL 1.1.0 patch 2016-12-24 12:09:10 +02:00
Christos Trochalakis
6cbf84df65 mod: Upgrade nginx-lua to 0.10.7 2016-12-24 12:08:34 +02:00
Christos Trochalakis
5140bc7eae mod: Upgrade nchan to 1.0.8
Closes: #844473
2016-12-24 12:08:32 +02:00
Christos Trochalakis
a27ccda836 Fix lintian error 'possible-missing-colon-in-closes'
Gbp-Dch: Ignore
2016-12-19 17:03:57 +02:00
Michael Lustfield
4deb3d7f52 Correcting location of default php-fpm socket. 2016-12-03 07:58:19 +00:00
Christos Trochalakis
bf78540e31 debian/rules: Correctly clean patched modules
Closes: #844506
Thanks: Sven-Haegar Koch for the initial patch.
2016-12-01 09:29:47 +02:00
Christos Trochalakis
e7164cf7ac Change my email 2016-11-21 16:21:24 +02:00
Christos Trochalakis
7c03e6673b Adjust experimental flow
We now dummy merge (-s ours) upstream into upstream-1.11 instead
of force pushing a clean branch on every release.

That way we can easier track the branch's history.
2016-11-18 17:26:38 +02:00
Christos Trochalakis
6c9b75da5f Release 1.10.2-2 2016-11-12 09:18:26 +02:00
Christos Trochalakis
424f50a53b Fix FTBFS for OpenSSL 1.1.0 2016-11-03 16:50:33 +02:00
Christos Trochalakis
0ec83a636e lua: Apply OpenSSL 1.1.0 FTBFS
https://github.com/openresty/lua-nginx-module/pull/761
2016-11-03 15:16:57 +02:00
Christos Trochalakis
2a4f371793 upstream-fair: Apply OpenSSL 1.1.0 FTBFS
https://github.com/gnosek/nginx-upstream-fair/pull/22
2016-11-03 15:07:10 +02:00
Christos Trochalakis
340b30f10c Rethink module patches logic
Collect all patches under debian/patches/modules so they can be
easily tracked and apply them before configure.
2016-11-03 14:57:35 +02:00
Christos Trochalakis
62276a745b mod: Convert dav-ext to dynamic module
Patch by Florian Kinder
2016-11-03 14:57:35 +02:00
Michael Lustfield
4cf05a14a9 Removing php major version number from comment 2016-10-29 20:48:02 +00:00
Christos Trochalakis
7f827f420a Release 1.10.2-1 2016-10-29 08:45:31 +03:00
Christos Trochalakis
333595dc83 CVE-2016-1247: Secure log file handling
Backporting patches from 1.6.2-5+deb8u{3,4} and adjusting
the compare-versions check to 1.10.2-1~.
2016-10-28 09:45:29 +03:00
Christos Trochalakis
37b847285a Revert "Adding support for packaged application configurations."
This reverts commit 5d09382c82.

We will include it in a later release (-2) and perhaps adjust
the paths involved.
2016-10-28 09:31:11 +03:00
Christos Trochalakis
1e6e4c88cf Drop unused lintian overrides (spelling-error-in-binary) 2016-10-20 10:00:17 +03:00
Christos Trochalakis
6a025de47d New upstream release 2016-10-20 09:49:53 +03:00