To summarize the reasons for the changes on this bug done by me:

This CVE has already been "Fix Released" in Saucy, as part of the
1.4.1-1ubuntu2 package, and as part of the merge of 1.4.1-1 from Debian
with the ubuntu delta that exists.

The affected versions are in Precise, Quantal, and Raring, and I have
assigned myself to those, as I will be working on preparing debdiffs for
each of the affected releases, after which a member of the security team
will be able to take a look at the debdiffs for inclusion into the
security updates.

Lucid is not affected by this CVE.

** Changed in: nginx (Ubuntu Precise)
   Importance: Undecided => Medium

** Changed in: nginx (Ubuntu Quantal)
   Importance: Undecided => Medium

** Changed in: nginx (Ubuntu Raring)
   Importance: Undecided => Medium

** Changed in: nginx (Ubuntu Precise)
     Assignee: (unassigned) => Thomas Ward (teward)

** Changed in: nginx (Ubuntu Quantal)
     Assignee: (unassigned) => Thomas Ward (teward)

** Changed in: nginx (Ubuntu Raring)
     Assignee: (unassigned) => Thomas Ward (teward)

** Changed in: nginx (Ubuntu)
     Assignee: Thomas Ward (teward) => (unassigned)

** Changed in: nginx (Ubuntu Precise)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu Quantal)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu Raring)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1182586

Title:
  CVE-2013-2070:  nginx proxy_pass buffer overflow vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1182586/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to