*** This bug is a security vulnerability ***

Public security bug reported:

It was announced by NGINX on May 31, 2016 that there is a security
update for NGINX.  Patches are available as below.

This is CVE-2016-4450.

------

(http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html)

A problem was identified in nginx code responsible for saving
client request body to a temporary file.  A specially crafted request
might result in worker process crash due to a NULL pointer dereference
while writing client request body to a temporary file (CVE-2016-4450).

The problem affects nginx 1.3.9 - 1.11.0.

The problem is fixed in nginx 1.11.1, 1.10.1.

Patch for nginx 1.9.13 - 1.11.0 can be found here:

http://nginx.org/download/patch.2016.write.txt

Patch for older nginx versions (1.3.9 - 1.9.12):

http://nginx.org/download/patch.2016.write2.txt

------

Trusty, Vivid, Wily, Xenial, and Yakkety are affected, based on the
NGINX upstream reported 'affected versions'.

** Affects: nginx (Ubuntu)
     Importance: Undecided
     Assignee: Thomas Ward (teward)
         Status: In Progress

** Affects: nginx (Ubuntu Trusty)
     Importance: Undecided
         Status: Confirmed

** Affects: nginx (Ubuntu Vivid)
     Importance: Undecided
         Status: Confirmed

** Affects: nginx (Ubuntu Wily)
     Importance: Undecided
         Status: Confirmed

** Affects: nginx (Ubuntu Xenial)
     Importance: Undecided
         Status: Confirmed

** Affects: nginx (Ubuntu Yakkety)
     Importance: Undecided
     Assignee: Thomas Ward (teward)
         Status: In Progress

** Description changed:

  It was announced by NGINX on May 31, 2016 that there is a security
  update for NGINX.
  
  ------
  
  (http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html)
  
  A problem was identified in nginx code responsible for saving
  client request body to a temporary file.  A specially crafted request
  might result in worker process crash due to a NULL pointer dereference
  while writing client request body to a temporary file (CVE-2016-4450).
  
  The problem affects nginx 1.3.9 - 1.11.0.
  
  The problem is fixed in nginx 1.11.1, 1.10.1.
  
  Patch for nginx 1.9.13 - 1.11.0 can be found here:
  
  http://nginx.org/download/patch.2016.write.txt
  
  Patch for older nginx versions (1.3.9 - 1.9.12):
  
  http://nginx.org/download/patch.2016.write2.txt
  
  ------
  
- Trusty, Vivid, Wily, Xenial, and Yakkety are affected.
+ Trusty, Vivid, Wily, Xenial, and Yakkety are affected, based on the
+ NGINX upstream reported 'affected versions'.

** Also affects: nginx (Ubuntu Yakkety)
   Importance: Undecided
       Status: Confirmed

** Also affects: nginx (Ubuntu Vivid)
   Importance: Undecided
       Status: New

** Also affects: nginx (Ubuntu Trusty)
   Importance: Undecided
       Status: New

** Also affects: nginx (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Also affects: nginx (Ubuntu Wily)
   Importance: Undecided
       Status: New

** Changed in: nginx (Ubuntu Xenial)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu Wily)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu Vivid)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu Trusty)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu Yakkety)
     Assignee: (unassigned) => Thomas Ward (teward)

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4450

** Summary changed:

- Security Advisory - May 31 2016
+ Security Advisory - May 31 2016 - CVE-2016-4450

** Description changed:

  It was announced by NGINX on May 31, 2016 that there is a security
- update for NGINX.
+ update for NGINX.  Patches are available as below.
+ 
+ This is CVE-2016-4450.
  
  ------
  
  (http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html)
  
  A problem was identified in nginx code responsible for saving
  client request body to a temporary file.  A specially crafted request
  might result in worker process crash due to a NULL pointer dereference
  while writing client request body to a temporary file (CVE-2016-4450).
  
  The problem affects nginx 1.3.9 - 1.11.0.
  
  The problem is fixed in nginx 1.11.1, 1.10.1.
  
  Patch for nginx 1.9.13 - 1.11.0 can be found here:
  
  http://nginx.org/download/patch.2016.write.txt
  
  Patch for older nginx versions (1.3.9 - 1.9.12):
  
  http://nginx.org/download/patch.2016.write2.txt
  
  ------
  
  Trusty, Vivid, Wily, Xenial, and Yakkety are affected, based on the
  NGINX upstream reported 'affected versions'.

** Changed in: nginx (Ubuntu Yakkety)
       Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1587577

Title:
  Security Advisory - May 31 2016 - CVE-2016-4450

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1587577/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to