Canonical solves the Nginx vulnerability in Ubuntu 14.04 LTS
Users should update their systems to fix this vulnerability!
Canonical has published details about the nginx vulnerability that affects Ubuntu 14.04 LTS (Trusty Tahr) in the Security Bulletin. The problem has been fixed.
Ubuntu developers have fixed a small nginx vulnerability. They explained that nginx may have been used to expose sensitive information on the network.
According to the Security Bulletin, "Antoine Delignat-Lavaud and Karthikeyan Bhargavan found that nginx mistakenly reused the cached SSL session. Attackers may exploit this issue to obtain information from different virtual hosts under specific configurations.
For a more detailed description of these problems, you can see the Canonical Security Bulletin. You should upgrade your Linux release to solve this problem.
This problem can be solved by upgrading the system to the latest nginx package (and dependent v package. To apply the patch, you can directly run the upgrade management program.
If you do not want to use the Software Updater, open the terminal and enter the following command (root permission required ):
- Sudo apt-get update
- Sudo apt-get dist-upgrade
In general, a standard system update will make necessary changes. To apply this patch, you do not have to restart your computer.
-------------------------------------- Split line --------------------------------------
Deployment of Nginx + MySQL + PHP in CentOS 6.2
Build a WEB server using Nginx
Build a Web server based on Linux6.3 + Nginx1.2 + PHP5 + MySQL5.5
Performance Tuning for Nginx in CentOS 6.3
Configure Nginx to load the ngx_pagespeed module in CentOS 6.3
Install and configure Nginx + Pcre + php-fpm in CentOS 6.4
Nginx installation and configuration instructions
Nginx log filtering using ngx_log_if does not record specific logs
-------------------------------------- Split line --------------------------------------
Nginx details: click here
Nginx: click here