Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-4450 (GCVE-0-2016-4450)
Vulnerability from cvelistv5
Published
2016-06-07 14:00
Modified
2024-08-06 00:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1036019", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036019" }, { "name": "GLSA-201606-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "[nginx-announce] 20160531 nginx security advisory (CVE-2016-4450)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" }, { "name": "USN-2991-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2991-1" }, { "name": "DSA-3592", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3592" }, { "name": "RHSA-2016:1425", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "name": "90967", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/90967" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-05-31T00:00:00", "descriptions": [ { "lang": "en", "value": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "1036019", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036019" }, { "name": "GLSA-201606-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "[nginx-announce] 20160531 nginx security advisory (CVE-2016-4450)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" }, { "name": "USN-2991-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2991-1" }, { "name": "DSA-3592", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3592" }, { "name": "RHSA-2016:1425", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "name": "90967", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/90967" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4450", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036019", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036019" }, { "name": "GLSA-201606-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "[nginx-announce] 20160531 nginx security advisory (CVE-2016-4450)", "refsource": "MLIST", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" }, { "name": "USN-2991-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2991-1" }, { "name": "DSA-3592", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3592" }, { "name": "RHSA-2016:1425", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "name": "90967", "refsource": "BID", "url": "http://www.securityfocus.com/bid/90967" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4450", "datePublished": "2016-06-07T14:00:00", "dateReserved": "2016-05-02T00:00:00", "dateUpdated": "2024-08-06T00:32:25.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-4450\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-06-07T14:06:14.200\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.\"},{\"lang\":\"es\",\"value\":\"os/unix/ngx_files.c en nginx en versiones anteriores a 1.10.1 y 1.11.x en versiones anteriores a 1.11.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda de proceso worker) a trav\u00e9s de una petici\u00f3n manipulada, implicando la escritura de una petici\u00f3n de cuerpo de cliente en un archivo temporal.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.3.9\",\"versionEndExcluding\":\"1.10.1\",\"matchCriteriaId\":\"F2EC9375-FBB9-4D3B-A41B-5D41550CA03D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:1.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4816D822-53EA-4E20-A8C5-33EA663B5B13\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3592\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90967\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036019\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2991-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1425\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201606-06\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3592\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/90967\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2991-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201606-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
fkie_cve-2016-4450
Vulnerability from fkie_nvd
Published
2016-06-07 14:06
Modified
2025-04-12 10:46
Severity ?
Summary
os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html | Vendor Advisory | |
secalert@redhat.com | http://www.debian.org/security/2016/dsa-3592 | Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/90967 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1036019 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2991-1 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2016:1425 | Third Party Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201606-06 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3592 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/90967 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036019 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2991-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2016:1425 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201606-06 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
f5 | nginx | * | |
f5 | nginx | 1.11.0 | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "F2EC9375-FBB9-4D3B-A41B-5D41550CA03D", "versionEndExcluding": "1.10.1", "versionStartIncluding": "1.3.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:nginx:1.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "4816D822-53EA-4E20-A8C5-33EA663B5B13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file." }, { "lang": "es", "value": "os/unix/ngx_files.c en nginx en versiones anteriores a 1.10.1 y 1.11.x en versiones anteriores a 1.11.1 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero NULL y ca\u00edda de proceso worker) a trav\u00e9s de una petici\u00f3n manipulada, implicando la escritura de una petici\u00f3n de cuerpo de cliente en un archivo temporal." } ], "id": "CVE-2016-4450", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-06-07T14:06:14.200", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3592" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/90967" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036019" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2991-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201606-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3592" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/90967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2991-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201606-06" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2024:10044-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
nginx-1.11.4-2.5 on GA media
Notes
Title of the patch
nginx-1.11.4-2.5 on GA media
Description of the patch
These are all security issues fixed in the nginx-1.11.4-2.5 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10044
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "nginx-1.11.4-2.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the nginx-1.11.4-2.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10044", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10044-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4315 page", "url": "https://www.suse.com/security/cve/CVE-2011-4315/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2089 page", "url": "https://www.suse.com/security/cve/CVE-2012-2089/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2070 page", "url": "https://www.suse.com/security/cve/CVE-2013-2070/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4547 page", "url": "https://www.suse.com/security/cve/CVE-2013-4547/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0133 page", "url": "https://www.suse.com/security/cve/CVE-2014-0133/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3556 page", "url": "https://www.suse.com/security/cve/CVE-2014-3556/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3616 page", "url": "https://www.suse.com/security/cve/CVE-2014-3616/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0742 page", "url": "https://www.suse.com/security/cve/CVE-2016-0742/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0746 page", "url": "https://www.suse.com/security/cve/CVE-2016-0746/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0747 page", "url": "https://www.suse.com/security/cve/CVE-2016-0747/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4450 page", "url": "https://www.suse.com/security/cve/CVE-2016-4450/" } ], "title": "nginx-1.11.4-2.5 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10044-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.aarch64", "product": { "name": "nginx-1.11.4-2.5.aarch64", "product_id": "nginx-1.11.4-2.5.aarch64" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.aarch64", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.aarch64", "product_id": "vim-plugin-nginx-1.11.4-2.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.ppc64le", "product": { "name": "nginx-1.11.4-2.5.ppc64le", "product_id": "nginx-1.11.4-2.5.ppc64le" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.ppc64le", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.ppc64le", "product_id": "vim-plugin-nginx-1.11.4-2.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.s390x", "product": { "name": "nginx-1.11.4-2.5.s390x", "product_id": "nginx-1.11.4-2.5.s390x" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.s390x", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.s390x", "product_id": "vim-plugin-nginx-1.11.4-2.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.x86_64", "product": { "name": "nginx-1.11.4-2.5.x86_64", "product_id": "nginx-1.11.4-2.5.x86_64" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.x86_64", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.x86_64", "product_id": "vim-plugin-nginx-1.11.4-2.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64" }, "product_reference": "nginx-1.11.4-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le" }, "product_reference": "nginx-1.11.4-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x" }, "product_reference": "nginx-1.11.4-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64" }, "product_reference": "nginx-1.11.4-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4315", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4315" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4315", "url": "https://www.suse.com/security/cve/CVE-2011-4315" }, { "category": "external", "summary": "SUSE Bug 731084 for CVE-2011-4315", "url": "https://bugzilla.suse.com/731084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-4315" }, { "cve": "CVE-2012-2089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2089" } ], "notes": [ { "category": "general", "text": "Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2089", "url": "https://www.suse.com/security/cve/CVE-2012-2089" }, { "category": "external", "summary": "SUSE Bug 757057 for CVE-2012-2089", "url": "https://bugzilla.suse.com/757057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2089" }, { "cve": "CVE-2013-2070", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2070" } ], "notes": [ { "category": "general", "text": "http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2070", "url": "https://www.suse.com/security/cve/CVE-2013-2070" }, { "category": "external", "summary": "SUSE Bug 821184 for CVE-2013-2070", "url": "https://bugzilla.suse.com/821184" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2070" }, { "cve": "CVE-2013-4547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4547" } ], "notes": [ { "category": "general", "text": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4547", "url": "https://www.suse.com/security/cve/CVE-2013-4547" }, { "category": "external", "summary": "SUSE Bug 851295 for CVE-2013-4547", "url": "https://bugzilla.suse.com/851295" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-4547" }, { "cve": "CVE-2014-0133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0133" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0133", "url": "https://www.suse.com/security/cve/CVE-2014-0133" }, { "category": "external", "summary": "SUSE Bug 869076 for CVE-2014-0133", "url": "https://bugzilla.suse.com/869076" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0133" }, { "cve": "CVE-2014-3556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3556" } ], "notes": [ { "category": "general", "text": "The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack, a similar issue to CVE-2011-0411.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3556", "url": "https://www.suse.com/security/cve/CVE-2014-3556" }, { "category": "external", "summary": "SUSE Bug 890428 for CVE-2014-3556", "url": "https://bugzilla.suse.com/890428" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3556" }, { "cve": "CVE-2014-3616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3616" } ], "notes": [ { "category": "general", "text": "nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct \"virtual host confusion\" attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3616", "url": "https://www.suse.com/security/cve/CVE-2014-3616" }, { "category": "external", "summary": "SUSE Bug 897029 for CVE-2014-3616", "url": "https://bugzilla.suse.com/897029" }, { "category": "external", "summary": "SUSE Bug 901519 for CVE-2014-3616", "url": "https://bugzilla.suse.com/901519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3616" }, { "cve": "CVE-2016-0742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0742" } ], "notes": [ { "category": "general", "text": "The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0742", "url": "https://www.suse.com/security/cve/CVE-2016-0742" }, { "category": "external", "summary": "SUSE Bug 963781 for CVE-2016-0742", "url": "https://bugzilla.suse.com/963781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-0742" }, { "cve": "CVE-2016-0746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0746" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0746", "url": "https://www.suse.com/security/cve/CVE-2016-0746" }, { "category": "external", "summary": "SUSE Bug 963778 for CVE-2016-0746", "url": "https://bugzilla.suse.com/963778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0746" }, { "cve": "CVE-2016-0747", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0747" } ], "notes": [ { "category": "general", "text": "The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0747", "url": "https://www.suse.com/security/cve/CVE-2016-0747" }, { "category": "external", "summary": "SUSE Bug 963775 for CVE-2016-0747", "url": "https://bugzilla.suse.com/963775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0747" }, { "cve": "CVE-2016-4450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4450" } ], "notes": [ { "category": "general", "text": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4450", "url": "https://www.suse.com/security/cve/CVE-2016-4450" }, { "category": "external", "summary": "SUSE Bug 982484 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982484" }, { "category": "external", "summary": "SUSE Bug 982505 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982505" }, { "category": "external", "summary": "SUSE Bug 982507 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4450" } ] }
opensuse-su-2017:0362-1
Vulnerability from csaf_opensuse
Published
2017-02-01 21:19
Modified
2017-02-01 21:19
Summary
Security update for nginx
Notes
Title of the patch
Security update for nginx
Description of the patch
This update for nginx fixes the following vulnerability:
- CVE-2016-4450: Remote attackers could have caused a denial of service
(NULL pointer dereference and worker process crash) via a crafted request,
involving writing a client request body to a temporary file.
Patchnames
openSUSE-2017-192
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nginx", "title": "Title of the patch" }, { "category": "description", "text": "This update for nginx fixes the following vulnerability:\n\n- CVE-2016-4450: Remote attackers could have caused a denial of service\n (NULL pointer dereference and worker process crash) via a crafted request,\n involving writing a client request body to a temporary file.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2017-192", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_0362-1.json" }, { "category": "self", "summary": "SUSE Bug 982505", "url": "https://bugzilla.suse.com/982505" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4450 page", "url": "https://www.suse.com/security/cve/CVE-2016-4450/" } ], "title": "Security update for nginx", "tracking": { "current_release_date": "2017-02-01T21:19:46Z", "generator": { "date": "2017-02-01T21:19:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2017:0362-1", "initial_release_date": "2017-02-01T21:19:46Z", "revision_history": [ { "date": "2017-02-01T21:19:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.8.1-9.1.aarch64", "product": { "name": "nginx-1.8.1-9.1.aarch64", "product_id": "nginx-1.8.1-9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.8.1-9.1.ppc64le", "product": { "name": "nginx-1.8.1-9.1.ppc64le", "product_id": "nginx-1.8.1-9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nginx-1.8.1-9.1.s390x", "product": { "name": "nginx-1.8.1-9.1.s390x", "product_id": "nginx-1.8.1-9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.8.1-9.1.x86_64", "product": { "name": "nginx-1.8.1-9.1.x86_64", "product_id": "nginx-1.8.1-9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.8.1-9.1.aarch64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.8.1-9.1.aarch64" }, "product_reference": "nginx-1.8.1-9.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.8.1-9.1.ppc64le as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.8.1-9.1.ppc64le" }, "product_reference": "nginx-1.8.1-9.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.8.1-9.1.s390x as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.8.1-9.1.s390x" }, "product_reference": "nginx-1.8.1-9.1.s390x", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.8.1-9.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.8.1-9.1.x86_64" }, "product_reference": "nginx-1.8.1-9.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4450" } ], "notes": [ { "category": "general", "text": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nginx-1.8.1-9.1.aarch64", "SUSE Package Hub 12:nginx-1.8.1-9.1.ppc64le", "SUSE Package Hub 12:nginx-1.8.1-9.1.s390x", "SUSE Package Hub 12:nginx-1.8.1-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4450", "url": "https://www.suse.com/security/cve/CVE-2016-4450" }, { "category": "external", "summary": "SUSE Bug 982484 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982484" }, { "category": "external", "summary": "SUSE Bug 982505 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982505" }, { "category": "external", "summary": "SUSE Bug 982507 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nginx-1.8.1-9.1.aarch64", "SUSE Package Hub 12:nginx-1.8.1-9.1.ppc64le", "SUSE Package Hub 12:nginx-1.8.1-9.1.s390x", "SUSE Package Hub 12:nginx-1.8.1-9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 12:nginx-1.8.1-9.1.aarch64", "SUSE Package Hub 12:nginx-1.8.1-9.1.ppc64le", "SUSE Package Hub 12:nginx-1.8.1-9.1.s390x", "SUSE Package Hub 12:nginx-1.8.1-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-01T21:19:46Z", "details": "moderate" } ], "title": "CVE-2016-4450" } ] }
opensuse-su-2017:0361-1
Vulnerability from csaf_opensuse
Published
2017-02-01 21:19
Modified
2017-02-01 21:19
Summary
Security update for nginx
Notes
Title of the patch
Security update for nginx
Description of the patch
This update for nginx fixes the following vulnerability:
- CVE-2016-4450: Remote attackers could have caused a denial of service
(NULL pointer dereference and worker process crash) via a crafted request,
involving writing a client request body to a temporary file.
Patchnames
openSUSE-2017-192
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nginx", "title": "Title of the patch" }, { "category": "description", "text": "This update for nginx fixes the following vulnerability:\n\n- CVE-2016-4450: Remote attackers could have caused a denial of service\n (NULL pointer dereference and worker process crash) via a crafted request,\n involving writing a client request body to a temporary file.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2017-192", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2017_0361-1.json" }, { "category": "self", "summary": "SUSE Bug 982505", "url": "https://bugzilla.suse.com/982505" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4450 page", "url": "https://www.suse.com/security/cve/CVE-2016-4450/" } ], "title": "Security update for nginx", "tracking": { "current_release_date": "2017-02-01T21:19:46Z", "generator": { "date": "2017-02-01T21:19:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2017:0361-1", "initial_release_date": "2017-02-01T21:19:46Z", "revision_history": [ { "date": "2017-02-01T21:19:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.8.1-9.1.aarch64", "product": { "name": "nginx-1.8.1-9.1.aarch64", "product_id": "nginx-1.8.1-9.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.8.1-9.1.ppc64le", "product": { "name": "nginx-1.8.1-9.1.ppc64le", "product_id": "nginx-1.8.1-9.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nginx-1.8.1-9.1.s390x", "product": { "name": "nginx-1.8.1-9.1.s390x", "product_id": "nginx-1.8.1-9.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.8.1-9.1.x86_64", "product": { "name": "nginx-1.8.1-9.1.x86_64", "product_id": "nginx-1.8.1-9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Package Hub 12", "product": { "name": "SUSE Package Hub 12", "product_id": "SUSE Package Hub 12", "product_identification_helper": { "cpe": "cpe:/o:suse:packagehub:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.8.1-9.1.aarch64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.8.1-9.1.aarch64" }, "product_reference": "nginx-1.8.1-9.1.aarch64", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.8.1-9.1.ppc64le as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.8.1-9.1.ppc64le" }, "product_reference": "nginx-1.8.1-9.1.ppc64le", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.8.1-9.1.s390x as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.8.1-9.1.s390x" }, "product_reference": "nginx-1.8.1-9.1.s390x", "relates_to_product_reference": "SUSE Package Hub 12" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.8.1-9.1.x86_64 as component of SUSE Package Hub 12", "product_id": "SUSE Package Hub 12:nginx-1.8.1-9.1.x86_64" }, "product_reference": "nginx-1.8.1-9.1.x86_64", "relates_to_product_reference": "SUSE Package Hub 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4450" } ], "notes": [ { "category": "general", "text": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Package Hub 12:nginx-1.8.1-9.1.aarch64", "SUSE Package Hub 12:nginx-1.8.1-9.1.ppc64le", "SUSE Package Hub 12:nginx-1.8.1-9.1.s390x", "SUSE Package Hub 12:nginx-1.8.1-9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4450", "url": "https://www.suse.com/security/cve/CVE-2016-4450" }, { "category": "external", "summary": "SUSE Bug 982484 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982484" }, { "category": "external", "summary": "SUSE Bug 982505 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982505" }, { "category": "external", "summary": "SUSE Bug 982507 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Package Hub 12:nginx-1.8.1-9.1.aarch64", "SUSE Package Hub 12:nginx-1.8.1-9.1.ppc64le", "SUSE Package Hub 12:nginx-1.8.1-9.1.s390x", "SUSE Package Hub 12:nginx-1.8.1-9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Package Hub 12:nginx-1.8.1-9.1.aarch64", "SUSE Package Hub 12:nginx-1.8.1-9.1.ppc64le", "SUSE Package Hub 12:nginx-1.8.1-9.1.s390x", "SUSE Package Hub 12:nginx-1.8.1-9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-01T21:19:46Z", "details": "moderate" } ], "title": "CVE-2016-4450" } ] }
gsd-2016-4450
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-4450", "description": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.", "id": "GSD-2016-4450", "references": [ "https://www.suse.com/security/cve/CVE-2016-4450.html", "https://www.debian.org/security/2016/dsa-3592", "https://access.redhat.com/errata/RHSA-2016:1425", "https://ubuntu.com/security/CVE-2016-4450", "https://advisories.mageia.org/CVE-2016-4450.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-4450.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-4450" ], "details": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.", "id": "GSD-2016-4450", "modified": "2023-12-13T01:21:18.992578Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4450", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1036019", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036019" }, { "name": "GLSA-201606-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "[nginx-announce] 20160531 nginx security advisory (CVE-2016-4450)", "refsource": "MLIST", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" }, { "name": "USN-2991-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2991-1" }, { "name": "DSA-3592", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3592" }, { "name": "RHSA-2016:1425", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "name": "90967", "refsource": "BID", "url": "http://www.securityfocus.com/bid/90967" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.10.1", "versionStartIncluding": "1.3.9", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:nginx:1.11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4450" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-476" } ] } ] }, "references": { "reference_data": [ { "name": "[nginx-announce] 20160531 nginx security advisory (CVE-2016-4450)", "refsource": "MLIST", "tags": [ "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" }, { "name": "USN-2991-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2991-1" }, { "name": "DSA-3592", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3592" }, { "name": "1036019", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036019" }, { "name": "90967", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/90967" }, { "name": "GLSA-201606-06", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "RHSA-2016:1425", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2021-11-10T16:00Z", "publishedDate": "2016-06-07T14:06Z" } } }
ghsa-qw3j-mxg7-jx9v
Vulnerability from github
Published
2022-05-13 01:05
Modified
2022-05-13 01:05
Severity ?
VLAI Severity ?
Details
os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.
{ "affected": [], "aliases": [ "CVE-2016-4450" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-06-07T14:06:00Z", "severity": "HIGH" }, "details": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.", "id": "GHSA-qw3j-mxg7-jx9v", "modified": "2022-05-13T01:05:15Z", "published": "2022-05-13T01:05:15Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4450" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201606-06" }, { "type": "WEB", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3592" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/90967" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036019" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2991-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2016:1425
Vulnerability from csaf_redhat
Published
2016-07-14 05:50
Modified
2025-08-03 15:56
Summary
Red Hat Security Advisory: rh-nginx18-nginx security update
Notes
Topic
An update for rh-nginx18-nginx is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Nginx is a web and proxy server with a focus on high concurrency, performance, and low memory usage.
The following packages have been upgraded to a newer upstream version: rh-nginx18-nginx (1.8.1).
Security Fix(es):
* A NULL pointer dereference flaw was found in the nginx code responsible for saving client request body to a temporary file. A remote attacker could send a specially crafted request that would cause nginx worker process to crash. (CVE-2016-4450)
* It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration. (CVE-2016-0742)
* A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration. (CVE-2016-0746)
* It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration. (CVE-2016-0747)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nginx18-nginx is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Nginx is a web and proxy server with a focus on high concurrency, performance, and low memory usage.\n\nThe following packages have been upgraded to a newer upstream version: rh-nginx18-nginx (1.8.1).\n\nSecurity Fix(es):\n\n* A NULL pointer dereference flaw was found in the nginx code responsible for saving client request body to a temporary file. A remote attacker could send a specially crafted request that would cause nginx worker process to crash. (CVE-2016-4450)\n\n* It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration. (CVE-2016-0742)\n\n* A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration. (CVE-2016-0746)\n\n* It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration. (CVE-2016-0747)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1425", "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1302587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302587" }, { "category": "external", "summary": "1302588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "category": "external", "summary": "1302589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302589" }, { "category": "external", "summary": "1341462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341462" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1425.json" } ], "title": "Red Hat Security Advisory: rh-nginx18-nginx security update", "tracking": { "current_release_date": "2025-08-03T15:56:38+00:00", "generator": { "date": "2025-08-03T15:56:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1425", "initial_release_date": "2016-07-14T05:50:00+00:00", "revision_history": [ { "date": "2016-07-14T05:50:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-07-14T05:50:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T15:56:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-RHSCL-2.2-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.2-7.1.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.2-6.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.2-6.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "product": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "product_id": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx-debuginfo@1.8.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "product": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "product_id": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx-debuginfo@1.8.1-1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.2-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "relates_to_product_reference": "6Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.2-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.2-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0742", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1302587" } ], "notes": [ { "category": "description", "text": "It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: invalid pointer dereference in resolver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0742" }, { "category": "external", "summary": "RHBZ#1302587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302587" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0742", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0742" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0742", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0742" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html" } ], "release_date": "2016-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-14T05:50:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1425" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: invalid pointer dereference in resolver" }, { "cve": "CVE-2016-0746", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1302588" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: use-after-free during CNAME response processing in resolver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0746" }, { "category": "external", "summary": "RHBZ#1302588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0746", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0746" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0746", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0746" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html" } ], "release_date": "2016-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-14T05:50:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1425" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: use-after-free during CNAME response processing in resolver" }, { "cve": "CVE-2016-0747", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1302589" } ], "notes": [ { "category": "description", "text": "It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Insufficient limits of CNAME resolution in resolver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0747" }, { "category": "external", "summary": "RHBZ#1302589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0747", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0747" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0747", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0747" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html" } ], "release_date": "2016-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-14T05:50:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1425" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: Insufficient limits of CNAME resolution in resolver" }, { "cve": "CVE-2016-4450", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2016-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341462" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the nginx code responsible for saving client request body to a temporary file. A remote attacker could send a specially crafted request that would cause nginx worker process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: NULL pointer dereference while writing client request body", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4450" }, { "category": "external", "summary": "RHBZ#1341462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4450" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" } ], "release_date": "2016-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-14T05:50:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1425" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: NULL pointer dereference while writing client request body" } ] }
suse-su-2017:0190-1
Vulnerability from csaf_suse
Published
2017-01-17 17:04
Modified
2017-01-17 17:04
Summary
Security update for nginx-1.0
Notes
Title of the patch
Security update for nginx-1.0
Description of the patch
This update for nginx-1.0 fixes the following issues:
This security issues fixed:
- CVE-2016-4450: NULL pointer dereference while writing client request body (bsc#982505).
- CVE-2016-1000105: Setting HTTP_PROXY environment variable via Proxy header (httpoxy) (bnc#988491).
Patchnames
sleslms13-nginx-12945,slestso13-nginx-12945,slewyst13-nginx-12945
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nginx-1.0", "title": "Title of the patch" }, { "category": "description", "text": "This update for nginx-1.0 fixes the following issues:\n\nThis security issues fixed:\n- CVE-2016-4450: NULL pointer dereference while writing client request body (bsc#982505).\n- CVE-2016-1000105: Setting HTTP_PROXY environment variable via Proxy header (httpoxy) (bnc#988491).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleslms13-nginx-12945,slestso13-nginx-12945,slewyst13-nginx-12945", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0190-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0190-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170190-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0190-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-January/002566.html" }, { "category": "self", "summary": "SUSE Bug 982505", "url": "https://bugzilla.suse.com/982505" }, { "category": "self", "summary": "SUSE Bug 988491", "url": "https://bugzilla.suse.com/988491" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1000105 page", "url": "https://www.suse.com/security/cve/CVE-2016-1000105/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4450 page", "url": "https://www.suse.com/security/cve/CVE-2016-4450/" } ], "title": "Security update for nginx-1.0", "tracking": { "current_release_date": "2017-01-17T17:04:53Z", "generator": { "date": "2017-01-17T17:04:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0190-1", "initial_release_date": "2017-01-17T17:04:53Z", "revision_history": [ { "date": "2017-01-17T17:04:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.0-1.0.15-0.34.1.i586", "product": { "name": "nginx-1.0-1.0.15-0.34.1.i586", "product_id": "nginx-1.0-1.0.15-0.34.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "nginx-1.0-1.0.15-0.34.1.ia64", "product": { "name": "nginx-1.0-1.0.15-0.34.1.ia64", "product_id": "nginx-1.0-1.0.15-0.34.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.0-1.0.15-0.34.1.ppc64", "product": { "name": "nginx-1.0-1.0.15-0.34.1.ppc64", "product_id": "nginx-1.0-1.0.15-0.34.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.0-1.0.15-0.34.1.s390x", "product": { "name": "nginx-1.0-1.0.15-0.34.1.s390x", "product_id": "nginx-1.0-1.0.15-0.34.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.0-1.0.15-0.34.1.x86_64", "product": { "name": "nginx-1.0-1.0.15-0.34.1.x86_64", "product_id": "nginx-1.0-1.0.15-0.34.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Lifecycle Management Server 1.3", "product": { "name": "SUSE Lifecycle Management Server 1.3", "product_id": "SUSE Lifecycle Management Server 1.3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-slms:1.3" } } }, { "category": "product_name", "name": "SUSE Studio Onsite 1.3", "product": { "name": "SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-studioonsite:1.3" } } }, { "category": "product_name", "name": "SUSE WebYast 1.3", "product": { "name": "SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3", "product_identification_helper": { "cpe": "cpe:/o:suse:webyast:1.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.34.1.x86_64 as component of SUSE Lifecycle Management Server 1.3", "product_id": "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64" }, "product_reference": "nginx-1.0-1.0.15-0.34.1.x86_64", "relates_to_product_reference": "SUSE Lifecycle Management Server 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.34.1.x86_64 as component of SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64" }, "product_reference": "nginx-1.0-1.0.15-0.34.1.x86_64", "relates_to_product_reference": "SUSE Studio Onsite 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.34.1.i586 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586" }, "product_reference": "nginx-1.0-1.0.15-0.34.1.i586", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.34.1.ia64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64" }, "product_reference": "nginx-1.0-1.0.15-0.34.1.ia64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.34.1.ppc64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64" }, "product_reference": "nginx-1.0-1.0.15-0.34.1.ppc64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.34.1.s390x as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x" }, "product_reference": "nginx-1.0-1.0.15-0.34.1.s390x", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.34.1.x86_64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64" }, "product_reference": "nginx-1.0-1.0.15-0.34.1.x86_64", "relates_to_product_reference": "SUSE WebYast 1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-1000105", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1000105" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1000105", "url": "https://www.suse.com/security/cve/CVE-2016-1000105" }, { "category": "external", "summary": "SUSE Bug 988484 for CVE-2016-1000105", "url": "https://bugzilla.suse.com/988484" }, { "category": "external", "summary": "SUSE Bug 988486 for CVE-2016-1000105", "url": "https://bugzilla.suse.com/988486" }, { "category": "external", "summary": "SUSE Bug 988487 for CVE-2016-1000105", "url": "https://bugzilla.suse.com/988487" }, { "category": "external", "summary": "SUSE Bug 988488 for CVE-2016-1000105", "url": "https://bugzilla.suse.com/988488" }, { "category": "external", "summary": "SUSE Bug 988489 for CVE-2016-1000105", "url": "https://bugzilla.suse.com/988489" }, { "category": "external", "summary": "SUSE Bug 988491 for CVE-2016-1000105", "url": "https://bugzilla.suse.com/988491" }, { "category": "external", "summary": "SUSE Bug 988492 for CVE-2016-1000105", "url": "https://bugzilla.suse.com/988492" }, { "category": "external", "summary": "SUSE Bug 989174 for CVE-2016-1000105", "url": "https://bugzilla.suse.com/989174" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-17T17:04:53Z", "details": "moderate" } ], "title": "CVE-2016-1000105" }, { "cve": "CVE-2016-4450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4450" } ], "notes": [ { "category": "general", "text": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4450", "url": "https://www.suse.com/security/cve/CVE-2016-4450" }, { "category": "external", "summary": "SUSE Bug 982484 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982484" }, { "category": "external", "summary": "SUSE Bug 982505 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982505" }, { "category": "external", "summary": "SUSE Bug 982507 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.34.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.34.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-17T17:04:53Z", "details": "moderate" } ], "title": "CVE-2016-4450" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…