UbuntuUpdates.org

Package "libnginx-mod-http-uploadprogress"

Name: libnginx-mod-http-uploadprogress

Description:

Upload progress system for Nginx

Latest version: 1.14.0-0ubuntu1.11
Release: bionic (18.04)
Level: updates
Repository: universe
Head package: nginx
Homepage: http://nginx.net

Links


Download "libnginx-mod-http-uploadprogress"


Other versions of "libnginx-mod-http-uploadprogress" in Bionic

Repository Area Version
base universe 1.14.0-0ubuntu1
security universe 1.14.0-0ubuntu1.11
PPA: Nginx 1.18.0-3ubuntu1+bionic1

Changelog

Version: 1.14.0-0ubuntu1.5 2019-08-16 13:07:21 UTC

  nginx (1.14.0-0ubuntu1.5) bionic; urgency=medium

  * No change rebuild for bionic outside of security pocket to pick up
    OpenSSL 1.1.1. (LP: #1840404)

 -- Marc Deslauriers <email address hidden> Fri, 16 Aug 2019 07:05:57 -0400

Source diff to previous version
1840404 [regression] 1.14.0-0ubuntu1.4 security update enables TLS1.3 without a choice

Version: 1.14.0-0ubuntu1.4 2019-08-15 18:07:45 UTC

  nginx (1.14.0-0ubuntu1.4) bionic-security; urgency=medium

  * SECURITY UPDATE: HTTP/2 Data Dribble issue
    - debian/patches/CVE-2019-9511.patch: limited number of DATA frames in
      src/http/v2/ngx_http_v2.c, src/http/v2/ngx_http_v2.h,
      src/http/v2/ngx_http_v2_filter_module.c.
    - CVE-2019-9511
  * SECURITY UPDATE: HTTP/2 Resource Loop / Priority Shuffling issue
    - debian/patches/CVE-2019-9513.patch: limited number of PRIORITY frames
      in src/http/v2/ngx_http_v2.c, src/http/v2/ngx_http_v2.h.
    - CVE-2019-9513
  * SECURITY UPDATE: HTTP/2 0-Length Headers Leak issue
    - debian/patches/CVE-2019-9516.patch: reject zero length headers with
      PROTOCOL_ERROR in src/http/v2/ngx_http_v2.c.
    - CVE-2019-9516

 -- Marc Deslauriers <email address hidden> Wed, 14 Aug 2019 14:44:40 -0400

Source diff to previous version
CVE-2019-9511 Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of ser
CVE-2019-9513 Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request strea
CVE-2019-9516 Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with

Version: 1.14.0-0ubuntu1.3 2019-07-22 10:06:18 UTC

  nginx (1.14.0-0ubuntu1.3) bionic; urgency=medium

  * No changes rebuild (to build against OpenSSL 1.1.1 in Bionic)
    (LP: #1836366)

 -- Thomas Ward <email address hidden> Fri, 12 Jul 2019 14:18:43 -0400

Source diff to previous version
1836366 [SRU] No Changes Rebuild in Bionic for OpenSSL compat reasons

Version: 1.14.0-0ubuntu1.2 2018-11-07 17:07:19 UTC

  nginx (1.14.0-0ubuntu1.2) bionic-security; urgency=medium

  * SECURITY UPDATE: excessive memory consumption in HTTP/2 implementation
    - debian/patches/CVE-2018-16843.patch: add flood detection in
      src/http/v2/ngx_http_v2.c, src/http/v2/ngx_http_v2.h.
    - CVE-2018-16843
  * SECURITY UPDATE: excessive CPU usage in HTTP/2 implementation
    - debian/patches/CVE-2018-16844.patch: limit the number of idle state
      switches in src/http/v2/ngx_http_v2.c, src/http/v2/ngx_http_v2.h.
    - CVE-2018-16844
  * SECURITY UPDATE: infinite loop in ngx_http_mp4_module
    - debian/patches/CVE-2018-16845.patch: fixed reading 64-bit atoms in
      src/http/modules/ngx_http_mp4_module.c.
    - CVE-2018-16845

 -- Marc Deslauriers <email address hidden> Tue, 06 Nov 2018 13:54:15 -0500

Source diff to previous version
CVE-2018-16843 Excessive memory usage in HTTP/2
CVE-2018-16844 Excessive CPU usage in HTTP/2
CVE-2018-16845 Memory disclosure in the ngx_http_mp4_module

Version: 1.14.0-0ubuntu1.1 2018-09-20 09:06:59 UTC

  nginx (1.14.0-0ubuntu1.1) bionic; urgency=medium

  * Stable Release Update. Do not attempt to start nginx if other daemon
    is binding to port 80, to prevent install failure (LP: #1782226):
    - d/nginx{core,light,full,extras}.postinst: Add checks for whether
      port 80 is in use or not to determine whether or not to attempt
      starting of the NGINX service during install/upgrade.
    - d/control: Add dependencies to nginx-{core,light,full,extras} on
      `iproute2` as the postinst scripts now use `ss` to determine if
      Port 80 is open or not.

 -- Andres Rodriguez <email address hidden> Mon, 20 Aug 2018 18:41:42 -0400

1782226 [SRU] Allow NGINX to install but not start during postinst if another process is bound to port 80



About   -   Send Feedback to @ubuntu_updates