diff -Nru nginx-1.2.6/debian/changelog nginx-1.2.6/debian/changelog --- nginx-1.2.6/debian/changelog 2013-05-09 14:34:56.000000000 -0400 +++ nginx-1.2.6/debian/changelog 2013-05-24 12:49:51.000000000 -0400 @@ -1,3 +1,10 @@ +nginx (1.2.6-1ubuntu3.2) raring-security; urgency=low + + * Security update (closes LP: #1182586): + * Patch to fix a buffer overflow vulnerability (CVE-2013-2070) + + -- Thomas Ward Fri, 24 May 2013 12:49:32 -0400 + nginx (1.2.6-1ubuntu3.1) raring; urgency=low * debian/patches/ubuntu-branding.patch: Move Ubuntu branding from diff -Nru nginx-1.2.6/debian/patches/cve-2013-2070.patch nginx-1.2.6/debian/patches/cve-2013-2070.patch --- nginx-1.2.6/debian/patches/cve-2013-2070.patch 1969-12-31 19:00:00.000000000 -0500 +++ nginx-1.2.6/debian/patches/cve-2013-2070.patch 2013-05-24 12:49:24.000000000 -0400 @@ -0,0 +1,18 @@ +Description: Patch derived from upstream patch, to fix CVE-2013-2070, which identified a vulnerability in proxy_pass +Origin: upstream, http://nginx.org/download/patch.2013.proxy.txt +Bug-Ubuntu: https://launchpad.net/bugs/1182586 +Index: nginx-1.2.6/src/http/modules/ngx_http_proxy_module.c +=================================================================== +--- nginx-1.2.6.orig/src/http/modules/ngx_http_proxy_module.c 2012-04-23 06:40:01.000000000 -0400 ++++ nginx-1.2.6/src/http/modules/ngx_http_proxy_module.c 2013-05-24 12:48:09.641562486 -0400 +@@ -1864,6 +1864,10 @@ + + } + ++ if (ctx->size < 0 || ctx->length < 0) { ++ goto invalid; ++ } ++ + return rc; + + done: diff -Nru nginx-1.2.6/debian/patches/series nginx-1.2.6/debian/patches/series --- nginx-1.2.6/debian/patches/series 2013-04-09 11:23:18.000000000 -0400 +++ nginx-1.2.6/debian/patches/series 2013-05-24 12:47:18.000000000 -0400 @@ -1,2 +1,3 @@ perl-use-dpkg-buildflags.patch ubuntu-branding.patch +cve-2013-2070.patch