Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-0746 (GCVE-0-2016-0746)
Vulnerability from cvelistv5
Published
2016-02-15 19:00
Modified
2024-08-05 22:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:30:03.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2016:0371", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bto.bluecoat.com/security-advisory/sa115" }, { "name": "GLSA-201606-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "1034869", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034869" }, { "name": "[nginx] 20160126 nginx security advisory (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html" }, { "name": "RHSA-2016:1425", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "name": "DSA-3473", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3473" }, { "name": "USN-2892-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-2892-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-01-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-21T23:06:59", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "openSUSE-SU-2016:0371", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bto.bluecoat.com/security-advisory/sa115" }, { "name": "GLSA-201606-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "1034869", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034869" }, { "name": "[nginx] 20160126 nginx security advisory (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html" }, { "name": "RHSA-2016:1425", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "name": "DSA-3473", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3473" }, { "name": "USN-2892-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-2892-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0746", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:0371", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa115", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa115" }, { "name": "GLSA-201606-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "1034869", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034869" }, { "name": "[nginx] 20160126 nginx security advisory (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747)", "refsource": "MLIST", "url": "http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html" }, { "name": "RHSA-2016:1425", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "name": "DSA-3473", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3473" }, { "name": "USN-2892-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2892-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "name": "https://support.apple.com/kb/HT212818", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-0746", "datePublished": "2016-02-15T19:00:00", "dateReserved": "2015-12-16T00:00:00", "dateUpdated": "2024-08-05T22:30:03.992Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-0746\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-02-15T19:59:01.157\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de uso de memoria previamente liberada en la resoluci\u00f3n en nginx, de la versi\u00f3n 0.6.18 hasta la 1.8.0 y versiones 1.9.x anteriores a la 1.9.10, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (cierre inesperado del proceso worker) o que tengan otro tipo de impacto sin especificar mediante una respuesta DNS relacionada con el procesamiento de respuestas CNAME.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.6.18\",\"versionEndIncluding\":\"1.8.0\",\"matchCriteriaId\":\"B305BA9C-0685-4BFA-9F9C-9D9E04FDDC6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.9.0\",\"versionEndExcluding\":\"1.9.10\",\"matchCriteriaId\":\"E90F693D-8EEF-4222-B562-67629C7C72DF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4863BE36-D16A-4D75-90D9-FD76DB5B48B7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"13.0\",\"matchCriteriaId\":\"BB279F6B-EE4C-4885-9CD4-657F6BD2548F\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/36\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3473\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1034869\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2892-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1425\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa115\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1302588\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201606-06\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212818\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2021/Sep/36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3473\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securitytracker.com/id/1034869\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2892-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1425\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bto.bluecoat.com/security-advisory/sa115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1302588\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201606-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT212818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-c3r2-x25x-6jwc
Vulnerability from github
Published
2022-05-13 01:04
Modified
2022-05-13 01:04
Severity ?
VLAI Severity ?
Details
Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
{ "affected": [], "aliases": [ "CVE-2016-0746" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-02-15T19:59:00Z", "severity": "CRITICAL" }, "details": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.", "id": "GHSA-c3r2-x25x-6jwc", "modified": "2022-05-13T01:04:26Z", "published": "2022-05-13T01:04:26Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0746" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "type": "WEB", "url": "https://bto.bluecoat.com/security-advisory/sa115" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201606-06" }, { "type": "WEB", "url": "https://support.apple.com/kb/HT212818" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html" }, { "type": "WEB", "url": "http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2021/Sep/36" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3473" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1034869" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-2892-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
opensuse-su-2024:10044-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
nginx-1.11.4-2.5 on GA media
Notes
Title of the patch
nginx-1.11.4-2.5 on GA media
Description of the patch
These are all security issues fixed in the nginx-1.11.4-2.5 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10044
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "nginx-1.11.4-2.5 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the nginx-1.11.4-2.5 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10044", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10044-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4315 page", "url": "https://www.suse.com/security/cve/CVE-2011-4315/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-2089 page", "url": "https://www.suse.com/security/cve/CVE-2012-2089/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2070 page", "url": "https://www.suse.com/security/cve/CVE-2013-2070/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4547 page", "url": "https://www.suse.com/security/cve/CVE-2013-4547/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0133 page", "url": "https://www.suse.com/security/cve/CVE-2014-0133/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3556 page", "url": "https://www.suse.com/security/cve/CVE-2014-3556/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-3616 page", "url": "https://www.suse.com/security/cve/CVE-2014-3616/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0742 page", "url": "https://www.suse.com/security/cve/CVE-2016-0742/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0746 page", "url": "https://www.suse.com/security/cve/CVE-2016-0746/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0747 page", "url": "https://www.suse.com/security/cve/CVE-2016-0747/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4450 page", "url": "https://www.suse.com/security/cve/CVE-2016-4450/" } ], "title": "nginx-1.11.4-2.5 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10044-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.aarch64", "product": { "name": "nginx-1.11.4-2.5.aarch64", "product_id": "nginx-1.11.4-2.5.aarch64" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.aarch64", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.aarch64", "product_id": "vim-plugin-nginx-1.11.4-2.5.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.ppc64le", "product": { "name": "nginx-1.11.4-2.5.ppc64le", "product_id": "nginx-1.11.4-2.5.ppc64le" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.ppc64le", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.ppc64le", "product_id": "vim-plugin-nginx-1.11.4-2.5.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.s390x", "product": { "name": "nginx-1.11.4-2.5.s390x", "product_id": "nginx-1.11.4-2.5.s390x" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.s390x", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.s390x", "product_id": "vim-plugin-nginx-1.11.4-2.5.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nginx-1.11.4-2.5.x86_64", "product": { "name": "nginx-1.11.4-2.5.x86_64", "product_id": "nginx-1.11.4-2.5.x86_64" } }, { "category": "product_version", "name": "vim-plugin-nginx-1.11.4-2.5.x86_64", "product": { "name": "vim-plugin-nginx-1.11.4-2.5.x86_64", "product_id": "vim-plugin-nginx-1.11.4-2.5.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64" }, "product_reference": "nginx-1.11.4-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le" }, "product_reference": "nginx-1.11.4-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x" }, "product_reference": "nginx-1.11.4-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.11.4-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64" }, "product_reference": "nginx-1.11.4-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "vim-plugin-nginx-1.11.4-2.5.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" }, "product_reference": "vim-plugin-nginx-1.11.4-2.5.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-4315", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4315" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4315", "url": "https://www.suse.com/security/cve/CVE-2011-4315" }, { "category": "external", "summary": "SUSE Bug 731084 for CVE-2011-4315", "url": "https://bugzilla.suse.com/731084" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-4315" }, { "cve": "CVE-2012-2089", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-2089" } ], "notes": [ { "category": "general", "text": "Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-2089", "url": "https://www.suse.com/security/cve/CVE-2012-2089" }, { "category": "external", "summary": "SUSE Bug 757057 for CVE-2012-2089", "url": "https://bugzilla.suse.com/757057" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-2089" }, { "cve": "CVE-2013-2070", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2070" } ], "notes": [ { "category": "general", "text": "http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2070", "url": "https://www.suse.com/security/cve/CVE-2013-2070" }, { "category": "external", "summary": "SUSE Bug 821184 for CVE-2013-2070", "url": "https://bugzilla.suse.com/821184" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2070" }, { "cve": "CVE-2013-4547", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4547" } ], "notes": [ { "category": "general", "text": "nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4547", "url": "https://www.suse.com/security/cve/CVE-2013-4547" }, { "category": "external", "summary": "SUSE Bug 851295 for CVE-2013-4547", "url": "https://bugzilla.suse.com/851295" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-4547" }, { "cve": "CVE-2014-0133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0133" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0133", "url": "https://www.suse.com/security/cve/CVE-2014-0133" }, { "category": "external", "summary": "SUSE Bug 869076 for CVE-2014-0133", "url": "https://bugzilla.suse.com/869076" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0133" }, { "cve": "CVE-2014-3556", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3556" } ], "notes": [ { "category": "general", "text": "The STARTTLS implementation in mail/ngx_mail_smtp_handler.c in the SMTP proxy in nginx 1.5.x and 1.6.x before 1.6.1 and 1.7.x before 1.7.4 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a \"plaintext command injection\" attack, a similar issue to CVE-2011-0411.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3556", "url": "https://www.suse.com/security/cve/CVE-2014-3556" }, { "category": "external", "summary": "SUSE Bug 890428 for CVE-2014-3556", "url": "https://bugzilla.suse.com/890428" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3556" }, { "cve": "CVE-2014-3616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-3616" } ], "notes": [ { "category": "general", "text": "nginx 0.5.6 through 1.7.4, when using the same shared ssl_session_cache or ssl_session_ticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct \"virtual host confusion\" attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-3616", "url": "https://www.suse.com/security/cve/CVE-2014-3616" }, { "category": "external", "summary": "SUSE Bug 897029 for CVE-2014-3616", "url": "https://bugzilla.suse.com/897029" }, { "category": "external", "summary": "SUSE Bug 901519 for CVE-2014-3616", "url": "https://bugzilla.suse.com/901519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-3616" }, { "cve": "CVE-2016-0742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0742" } ], "notes": [ { "category": "general", "text": "The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0742", "url": "https://www.suse.com/security/cve/CVE-2016-0742" }, { "category": "external", "summary": "SUSE Bug 963781 for CVE-2016-0742", "url": "https://bugzilla.suse.com/963781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-0742" }, { "cve": "CVE-2016-0746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0746" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0746", "url": "https://www.suse.com/security/cve/CVE-2016-0746" }, { "category": "external", "summary": "SUSE Bug 963778 for CVE-2016-0746", "url": "https://bugzilla.suse.com/963778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0746" }, { "cve": "CVE-2016-0747", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0747" } ], "notes": [ { "category": "general", "text": "The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0747", "url": "https://www.suse.com/security/cve/CVE-2016-0747" }, { "category": "external", "summary": "SUSE Bug 963775 for CVE-2016-0747", "url": "https://bugzilla.suse.com/963775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0747" }, { "cve": "CVE-2016-4450", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4450" } ], "notes": [ { "category": "general", "text": "os/unix/ngx_files.c in nginx before 1.10.1 and 1.11.x before 1.11.1 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a crafted request, involving writing a client request body to a temporary file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4450", "url": "https://www.suse.com/security/cve/CVE-2016-4450" }, { "category": "external", "summary": "SUSE Bug 982484 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982484" }, { "category": "external", "summary": "SUSE Bug 982505 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982505" }, { "category": "external", "summary": "SUSE Bug 982507 for CVE-2016-4450", "url": "https://bugzilla.suse.com/982507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:nginx-1.11.4-2.5.x86_64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.aarch64", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.ppc64le", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.s390x", "openSUSE Tumbleweed:vim-plugin-nginx-1.11.4-2.5.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4450" } ] }
fkie_cve-2016-0746
Vulnerability from fkie_nvd
Published
2016-02-15 19:59
Modified
2025-04-12 10:46
Severity ?
Summary
Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html | Vendor Advisory | |
secalert@redhat.com | http://seclists.org/fulldisclosure/2021/Sep/36 | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2016/dsa-3473 | Third Party Advisory | |
secalert@redhat.com | http://www.securitytracker.com/id/1034869 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-2892-1 | Third Party Advisory | |
secalert@redhat.com | https://access.redhat.com/errata/RHSA-2016:1425 | Third Party Advisory | |
secalert@redhat.com | https://bto.bluecoat.com/security-advisory/sa115 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1302588 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://security.gentoo.org/glsa/201606-06 | Third Party Advisory | |
secalert@redhat.com | https://support.apple.com/kb/HT212818 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2021/Sep/36 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3473 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034869 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2892-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2016:1425 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bto.bluecoat.com/security-advisory/sa115 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1302588 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201606-06 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT212818 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
f5 | nginx | * | |
f5 | nginx | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
debian | debian_linux | 7.0 | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
opensuse | leap | 42.1 | |
apple | xcode | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "B305BA9C-0685-4BFA-9F9C-9D9E04FDDC6D", "versionEndIncluding": "1.8.0", "versionStartIncluding": "0.6.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "E90F693D-8EEF-4222-B562-67629C7C72DF", "versionEndExcluding": "1.9.10", "versionStartIncluding": "1.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "4863BE36-D16A-4D75-90D9-FD76DB5B48B7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB279F6B-EE4C-4885-9CD4-657F6BD2548F", "versionEndExcluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing." }, { "lang": "es", "value": "Vulnerabilidad de uso de memoria previamente liberada en la resoluci\u00f3n en nginx, de la versi\u00f3n 0.6.18 hasta la 1.8.0 y versiones 1.9.x anteriores a la 1.9.10, permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (cierre inesperado del proceso worker) o que tengan otro tipo de impacto sin especificar mediante una respuesta DNS relacionada con el procesamiento de respuestas CNAME." } ], "id": "CVE-2016-0746", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-02-15T19:59:01.157", "references": [ { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3473" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034869" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2892-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa115" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201606-06" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212818" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3473" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2892-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201606-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212818" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2016:1425
Vulnerability from csaf_redhat
Published
2016-07-14 05:50
Modified
2025-08-03 15:56
Summary
Red Hat Security Advisory: rh-nginx18-nginx security update
Notes
Topic
An update for rh-nginx18-nginx is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Nginx is a web and proxy server with a focus on high concurrency, performance, and low memory usage.
The following packages have been upgraded to a newer upstream version: rh-nginx18-nginx (1.8.1).
Security Fix(es):
* A NULL pointer dereference flaw was found in the nginx code responsible for saving client request body to a temporary file. A remote attacker could send a specially crafted request that would cause nginx worker process to crash. (CVE-2016-4450)
* It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration. (CVE-2016-0742)
* A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration. (CVE-2016-0746)
* It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration. (CVE-2016-0747)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-nginx18-nginx is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Nginx is a web and proxy server with a focus on high concurrency, performance, and low memory usage.\n\nThe following packages have been upgraded to a newer upstream version: rh-nginx18-nginx (1.8.1).\n\nSecurity Fix(es):\n\n* A NULL pointer dereference flaw was found in the nginx code responsible for saving client request body to a temporary file. A remote attacker could send a specially crafted request that would cause nginx worker process to crash. (CVE-2016-4450)\n\n* It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration. (CVE-2016-0742)\n\n* A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration. (CVE-2016-0746)\n\n* It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration. (CVE-2016-0747)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1425", "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1302587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302587" }, { "category": "external", "summary": "1302588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "category": "external", "summary": "1302589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302589" }, { "category": "external", "summary": "1341462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341462" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1425.json" } ], "title": "Red Hat Security Advisory: rh-nginx18-nginx security update", "tracking": { "current_release_date": "2025-08-03T15:56:38+00:00", "generator": { "date": "2025-08-03T15:56:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1425", "initial_release_date": "2016-07-14T05:50:00+00:00", "revision_history": [ { "date": "2016-07-14T05:50:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-07-14T05:50:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-03T15:56:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-RHSCL-2.2-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.2-7.1.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.2-6.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.2-6.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "product": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "product_id": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx-debuginfo@1.8.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "product": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "product_id": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx-debuginfo@1.8.1-1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "product": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "product_id": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el6?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.2-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src", "relates_to_product_reference": "6Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "relates_to_product_reference": "6Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.2-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.2-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)", "product_id": "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Server-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" }, "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "relates_to_product_reference": "7Workstation-RHSCL-2.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0742", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1302587" } ], "notes": [ { "category": "description", "text": "It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: invalid pointer dereference in resolver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0742" }, { "category": "external", "summary": "RHBZ#1302587", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302587" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0742", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0742" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0742", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0742" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html" } ], "release_date": "2016-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-14T05:50:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1425" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: invalid pointer dereference in resolver" }, { "cve": "CVE-2016-0746", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1302588" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: use-after-free during CNAME response processing in resolver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0746" }, { "category": "external", "summary": "RHBZ#1302588", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0746", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0746" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0746", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0746" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html" } ], "release_date": "2016-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-14T05:50:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1425" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: use-after-free during CNAME response processing in resolver" }, { "cve": "CVE-2016-0747", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2016-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1302589" } ], "notes": [ { "category": "description", "text": "It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: Insufficient limits of CNAME resolution in resolver", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0747" }, { "category": "external", "summary": "RHBZ#1302589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0747", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0747" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0747", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0747" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html" } ], "release_date": "2016-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-14T05:50:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1425" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: Insufficient limits of CNAME resolution in resolver" }, { "cve": "CVE-2016-4450", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2016-05-31T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1341462" } ], "notes": [ { "category": "description", "text": "A NULL pointer dereference flaw was found in the nginx code responsible for saving client request body to a temporary file. A remote attacker could send a specially crafted request that would cause nginx worker process to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "nginx: NULL pointer dereference while writing client request body", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4450" }, { "category": "external", "summary": "RHBZ#1341462", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341462" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4450" }, { "category": "external", "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html", "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html" } ], "release_date": "2016-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-07-14T05:50:00+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.", "product_ids": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1425" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64", "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64", "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nginx: NULL pointer dereference while writing client request body" } ] }
gsd-2016-0746
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-0746", "description": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.", "id": "GSD-2016-0746", "references": [ "https://www.suse.com/security/cve/CVE-2016-0746.html", "https://www.debian.org/security/2016/dsa-3473", "https://access.redhat.com/errata/RHSA-2016:1425", "https://ubuntu.com/security/CVE-2016-0746", "https://advisories.mageia.org/CVE-2016-0746.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-0746.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-0746" ], "details": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.", "id": "GSD-2016-0746", "modified": "2023-12-13T01:21:17.301124Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0746", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:0371", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html" }, { "name": "https://bto.bluecoat.com/security-advisory/sa115", "refsource": "CONFIRM", "url": "https://bto.bluecoat.com/security-advisory/sa115" }, { "name": "GLSA-201606-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "1034869", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034869" }, { "name": "[nginx] 20160126 nginx security advisory (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747)", "refsource": "MLIST", "url": "http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html" }, { "name": "RHSA-2016:1425", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "name": "DSA-3473", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2016/dsa-3473" }, { "name": "USN-2892-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-2892-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "name": "https://support.apple.com/kb/HT212818", "refsource": "CONFIRM", "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.8.0", "versionStartIncluding": "0.6.18", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.9.10", "versionStartIncluding": "1.9.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "13.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-0746" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2016:0371", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588" }, { "name": "USN-2892-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-2892-1" }, { "name": "[nginx] 20160126 nginx security advisory (CVE-2016-0742, CVE-2016-0746, CVE-2016-0747)", "refsource": "MLIST", "tags": [ "Vendor Advisory" ], "url": "http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html" }, { "name": "DSA-3473", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3473" }, { "name": "https://bto.bluecoat.com/security-advisory/sa115", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://bto.bluecoat.com/security-advisory/sa115" }, { "name": "1034869", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034869" }, { "name": "GLSA-201606-06", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201606-06" }, { "name": "RHSA-2016:1425", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2016:1425" }, { "name": "https://support.apple.com/kb/HT212818", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/kb/HT212818" }, { "name": "20210921 APPLE-SA-2021-09-20-4 Xcode 13", "refsource": "FULLDISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Sep/36" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2021-12-16T18:43Z", "publishedDate": "2016-02-15T19:59Z" } } }
suse-su-2016:1232-1
Vulnerability from csaf_suse
Published
2016-05-04 12:28
Modified
2016-05-04 12:28
Summary
Security update for nginx-1.0
Notes
Title of the patch
Security update for nginx-1.0
Description of the patch
This update for nginx-1.0 fixes the following issues:
Security fixes:
- CVE-2016-0742: Invalid pointer dereference during DNS server response processing
- CVE-2016-0747: Resource exhaustion through unlimited CNAME resolution
- CVE-2016-0746: Use-after-free condition during CNAME response processing
Patchnames
sleslms13-nginx-1.0-12540,slestso13-nginx-1.0-12540,slewyst13-nginx-1.0-12540
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for nginx-1.0", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for nginx-1.0 fixes the following issues:\n\nSecurity fixes:\n- CVE-2016-0742: Invalid pointer dereference during DNS server response processing\n- CVE-2016-0747: Resource exhaustion through unlimited CNAME resolution\n- CVE-2016-0746: Use-after-free condition during CNAME response processing\n", "title": "Description of the patch" }, { "category": "details", "text": "sleslms13-nginx-1.0-12540,slestso13-nginx-1.0-12540,slewyst13-nginx-1.0-12540", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1232-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1232-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161232-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1232-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-May/002041.html" }, { "category": "self", "summary": "SUSE Bug 963775", "url": "https://bugzilla.suse.com/963775" }, { "category": "self", "summary": "SUSE Bug 963778", "url": "https://bugzilla.suse.com/963778" }, { "category": "self", "summary": "SUSE Bug 963781", "url": "https://bugzilla.suse.com/963781" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0742 page", "url": "https://www.suse.com/security/cve/CVE-2016-0742/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0746 page", "url": "https://www.suse.com/security/cve/CVE-2016-0746/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0747 page", "url": "https://www.suse.com/security/cve/CVE-2016-0747/" } ], "title": "Security update for nginx-1.0", "tracking": { "current_release_date": "2016-05-04T12:28:17Z", "generator": { "date": "2016-05-04T12:28:17Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1232-1", "initial_release_date": "2016-05-04T12:28:17Z", "revision_history": [ { "date": "2016-05-04T12:28:17Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "GeoIP-1.4.7-2.10.1.i586", "product": { "name": "GeoIP-1.4.7-2.10.1.i586", "product_id": "GeoIP-1.4.7-2.10.1.i586" } }, { "category": "product_version", "name": "libGeoIP1-1.4.7-2.10.1.i586", "product": { "name": "libGeoIP1-1.4.7-2.10.1.i586", "product_id": "libGeoIP1-1.4.7-2.10.1.i586" } }, { "category": "product_version", "name": "nginx-1.0-1.0.15-0.29.2.i586", "product": { "name": "nginx-1.0-1.0.15-0.29.2.i586", "product_id": "nginx-1.0-1.0.15-0.29.2.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "GeoIP-1.4.7-2.10.1.ia64", "product": { "name": "GeoIP-1.4.7-2.10.1.ia64", "product_id": "GeoIP-1.4.7-2.10.1.ia64" } }, { "category": "product_version", "name": "libGeoIP1-1.4.7-2.10.1.ia64", "product": { "name": "libGeoIP1-1.4.7-2.10.1.ia64", "product_id": "libGeoIP1-1.4.7-2.10.1.ia64" } }, { "category": "product_version", "name": "nginx-1.0-1.0.15-0.29.2.ia64", "product": { "name": "nginx-1.0-1.0.15-0.29.2.ia64", "product_id": "nginx-1.0-1.0.15-0.29.2.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "GeoIP-1.4.7-2.10.1.ppc64", "product": { "name": "GeoIP-1.4.7-2.10.1.ppc64", "product_id": "GeoIP-1.4.7-2.10.1.ppc64" } }, { "category": "product_version", "name": "libGeoIP1-1.4.7-2.10.1.ppc64", "product": { "name": "libGeoIP1-1.4.7-2.10.1.ppc64", "product_id": "libGeoIP1-1.4.7-2.10.1.ppc64" } }, { "category": "product_version", "name": "nginx-1.0-1.0.15-0.29.2.ppc64", "product": { "name": "nginx-1.0-1.0.15-0.29.2.ppc64", "product_id": "nginx-1.0-1.0.15-0.29.2.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "GeoIP-1.4.7-2.10.1.s390x", "product": { "name": "GeoIP-1.4.7-2.10.1.s390x", "product_id": "GeoIP-1.4.7-2.10.1.s390x" } }, { "category": "product_version", "name": "libGeoIP1-1.4.7-2.10.1.s390x", "product": { "name": "libGeoIP1-1.4.7-2.10.1.s390x", "product_id": "libGeoIP1-1.4.7-2.10.1.s390x" } }, { "category": "product_version", "name": "nginx-1.0-1.0.15-0.29.2.s390x", "product": { "name": "nginx-1.0-1.0.15-0.29.2.s390x", "product_id": "nginx-1.0-1.0.15-0.29.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "GeoIP-1.4.7-2.10.1.x86_64", "product": { "name": "GeoIP-1.4.7-2.10.1.x86_64", "product_id": "GeoIP-1.4.7-2.10.1.x86_64" } }, { "category": "product_version", "name": "libGeoIP1-1.4.7-2.10.1.x86_64", "product": { "name": "libGeoIP1-1.4.7-2.10.1.x86_64", "product_id": "libGeoIP1-1.4.7-2.10.1.x86_64" } }, { "category": "product_version", "name": "nginx-1.0-1.0.15-0.29.2.x86_64", "product": { "name": "nginx-1.0-1.0.15-0.29.2.x86_64", "product_id": "nginx-1.0-1.0.15-0.29.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Lifecycle Management Server 1.3", "product": { "name": "SUSE Lifecycle Management Server 1.3", "product_id": "SUSE Lifecycle Management Server 1.3", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-slms:1.3" } } }, { "category": "product_name", "name": "SUSE Studio Onsite 1.3", "product": { "name": "SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-studioonsite:1.3" } } }, { "category": "product_name", "name": "SUSE WebYast 1.3", "product": { "name": "SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3", "product_identification_helper": { "cpe": "cpe:/o:suse:webyast:1.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "GeoIP-1.4.7-2.10.1.x86_64 as component of SUSE Lifecycle Management Server 1.3", "product_id": "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64" }, "product_reference": "GeoIP-1.4.7-2.10.1.x86_64", "relates_to_product_reference": "SUSE Lifecycle Management Server 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "libGeoIP1-1.4.7-2.10.1.x86_64 as component of SUSE Lifecycle Management Server 1.3", "product_id": "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64" }, "product_reference": "libGeoIP1-1.4.7-2.10.1.x86_64", "relates_to_product_reference": "SUSE Lifecycle Management Server 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.29.2.x86_64 as component of SUSE Lifecycle Management Server 1.3", "product_id": "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" }, "product_reference": "nginx-1.0-1.0.15-0.29.2.x86_64", "relates_to_product_reference": "SUSE Lifecycle Management Server 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "libGeoIP1-1.4.7-2.10.1.x86_64 as component of SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64" }, "product_reference": "libGeoIP1-1.4.7-2.10.1.x86_64", "relates_to_product_reference": "SUSE Studio Onsite 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.29.2.x86_64 as component of SUSE Studio Onsite 1.3", "product_id": "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" }, "product_reference": "nginx-1.0-1.0.15-0.29.2.x86_64", "relates_to_product_reference": "SUSE Studio Onsite 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "GeoIP-1.4.7-2.10.1.i586 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586" }, "product_reference": "GeoIP-1.4.7-2.10.1.i586", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "GeoIP-1.4.7-2.10.1.ia64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64" }, "product_reference": "GeoIP-1.4.7-2.10.1.ia64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "GeoIP-1.4.7-2.10.1.ppc64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64" }, "product_reference": "GeoIP-1.4.7-2.10.1.ppc64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "GeoIP-1.4.7-2.10.1.s390x as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x" }, "product_reference": "GeoIP-1.4.7-2.10.1.s390x", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "GeoIP-1.4.7-2.10.1.x86_64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64" }, "product_reference": "GeoIP-1.4.7-2.10.1.x86_64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "libGeoIP1-1.4.7-2.10.1.i586 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586" }, "product_reference": "libGeoIP1-1.4.7-2.10.1.i586", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "libGeoIP1-1.4.7-2.10.1.ia64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64" }, "product_reference": "libGeoIP1-1.4.7-2.10.1.ia64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "libGeoIP1-1.4.7-2.10.1.ppc64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64" }, "product_reference": "libGeoIP1-1.4.7-2.10.1.ppc64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "libGeoIP1-1.4.7-2.10.1.s390x as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x" }, "product_reference": "libGeoIP1-1.4.7-2.10.1.s390x", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "libGeoIP1-1.4.7-2.10.1.x86_64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64" }, "product_reference": "libGeoIP1-1.4.7-2.10.1.x86_64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.29.2.i586 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586" }, "product_reference": "nginx-1.0-1.0.15-0.29.2.i586", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.29.2.ia64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64" }, "product_reference": "nginx-1.0-1.0.15-0.29.2.ia64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.29.2.ppc64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64" }, "product_reference": "nginx-1.0-1.0.15-0.29.2.ppc64", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.29.2.s390x as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x" }, "product_reference": "nginx-1.0-1.0.15-0.29.2.s390x", "relates_to_product_reference": "SUSE WebYast 1.3" }, { "category": "default_component_of", "full_product_name": { "name": "nginx-1.0-1.0.15-0.29.2.x86_64 as component of SUSE WebYast 1.3", "product_id": "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" }, "product_reference": "nginx-1.0-1.0.15-0.29.2.x86_64", "relates_to_product_reference": "SUSE WebYast 1.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-0742", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0742" } ], "notes": [ { "category": "general", "text": "The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0742", "url": "https://www.suse.com/security/cve/CVE-2016-0742" }, { "category": "external", "summary": "SUSE Bug 963781 for CVE-2016-0742", "url": "https://bugzilla.suse.com/963781" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-04T12:28:17Z", "details": "moderate" } ], "title": "CVE-2016-0742" }, { "cve": "CVE-2016-0746", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0746" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0746", "url": "https://www.suse.com/security/cve/CVE-2016-0746" }, { "category": "external", "summary": "SUSE Bug 963778 for CVE-2016-0746", "url": "https://bugzilla.suse.com/963778" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-04T12:28:17Z", "details": "low" } ], "title": "CVE-2016-0746" }, { "cve": "CVE-2016-0747", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0747" } ], "notes": [ { "category": "general", "text": "The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0747", "url": "https://www.suse.com/security/cve/CVE-2016-0747" }, { "category": "external", "summary": "SUSE Bug 963775 for CVE-2016-0747", "url": "https://bugzilla.suse.com/963775" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Lifecycle Management Server 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Lifecycle Management Server 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE Studio Onsite 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE Studio Onsite 1.3:nginx-1.0-1.0.15-0.29.2.x86_64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:GeoIP-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.i586", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ia64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.ppc64", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.s390x", "SUSE WebYast 1.3:libGeoIP1-1.4.7-2.10.1.x86_64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.i586", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ia64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.ppc64", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.s390x", "SUSE WebYast 1.3:nginx-1.0-1.0.15-0.29.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-05-04T12:28:17Z", "details": "low" } ], "title": "CVE-2016-0747" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…