nginx: security bump to version 1.12.1

Fixes CVE-2017-7529 - Nginx versions since 0.5.6 up to and including 1.13.2
are vulnerable to integer overflow vulnerability in nginx range filter
module resulting into leak of potentially sensitive information triggered by
specially crafted request.

For more details, see:
http://mailman.nginx.org/pipermail/nginx-announce/2017/000200.html

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
This commit is contained in:
Peter Korsgaard 2017-07-14 11:08:12 +02:00
parent f5f3eb0bc2
commit e67e6a72fd
2 changed files with 2 additions and 2 deletions

View File

@ -1,2 +1,2 @@
# Locally calculated after checking pgp signature
sha256 b4222e26fdb620a8d3c3a3a8b955e08b713672e1bc5198d1e4f462308a795b30 nginx-1.12.0.tar.gz
sha256 8793bf426485a30f91021b6b945a9fd8a84d87d17b566562c3797aba8fac76fb nginx-1.12.1.tar.gz

View File

@ -4,7 +4,7 @@
#
################################################################################
NGINX_VERSION = 1.12.0
NGINX_VERSION = 1.12.1
NGINX_SITE = http://nginx.org/download
NGINX_LICENSE = BSD-2-Clause
NGINX_LICENSE_FILES = LICENSE