*** This bug is a security vulnerability *** Public security bug reported:
It was announced by NGINX on May 31, 2016 that there is a security update for NGINX. Patches are available as below. This is CVE-2016-4450. ------ (http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html) A problem was identified in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while writing client request body to a temporary file (CVE-2016-4450). The problem affects nginx 1.3.9 - 1.11.0. The problem is fixed in nginx 1.11.1, 1.10.1. Patch for nginx 1.9.13 - 1.11.0 can be found here: http://nginx.org/download/patch.2016.write.txt Patch for older nginx versions (1.3.9 - 1.9.12): http://nginx.org/download/patch.2016.write2.txt ------ Trusty, Vivid, Wily, Xenial, and Yakkety are affected, based on the NGINX upstream reported 'affected versions'. ** Affects: nginx (Ubuntu) Importance: Undecided Assignee: Thomas Ward (teward) Status: In Progress ** Affects: nginx (Ubuntu Trusty) Importance: Undecided Status: Confirmed ** Affects: nginx (Ubuntu Vivid) Importance: Undecided Status: Confirmed ** Affects: nginx (Ubuntu Wily) Importance: Undecided Status: Confirmed ** Affects: nginx (Ubuntu Xenial) Importance: Undecided Status: Confirmed ** Affects: nginx (Ubuntu Yakkety) Importance: Undecided Assignee: Thomas Ward (teward) Status: In Progress ** Description changed: It was announced by NGINX on May 31, 2016 that there is a security update for NGINX. ------ (http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html) A problem was identified in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while writing client request body to a temporary file (CVE-2016-4450). The problem affects nginx 1.3.9 - 1.11.0. The problem is fixed in nginx 1.11.1, 1.10.1. Patch for nginx 1.9.13 - 1.11.0 can be found here: http://nginx.org/download/patch.2016.write.txt Patch for older nginx versions (1.3.9 - 1.9.12): http://nginx.org/download/patch.2016.write2.txt ------ - Trusty, Vivid, Wily, Xenial, and Yakkety are affected. + Trusty, Vivid, Wily, Xenial, and Yakkety are affected, based on the + NGINX upstream reported 'affected versions'. ** Also affects: nginx (Ubuntu Yakkety) Importance: Undecided Status: Confirmed ** Also affects: nginx (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: nginx (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: nginx (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: nginx (Ubuntu Wily) Importance: Undecided Status: New ** Changed in: nginx (Ubuntu Xenial) Status: New => Confirmed ** Changed in: nginx (Ubuntu Wily) Status: New => Confirmed ** Changed in: nginx (Ubuntu Vivid) Status: New => Confirmed ** Changed in: nginx (Ubuntu Trusty) Status: New => Confirmed ** Changed in: nginx (Ubuntu Yakkety) Assignee: (unassigned) => Thomas Ward (teward) ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-4450 ** Summary changed: - Security Advisory - May 31 2016 + Security Advisory - May 31 2016 - CVE-2016-4450 ** Description changed: It was announced by NGINX on May 31, 2016 that there is a security - update for NGINX. + update for NGINX. Patches are available as below. + + This is CVE-2016-4450. ------ (http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html) A problem was identified in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while writing client request body to a temporary file (CVE-2016-4450). The problem affects nginx 1.3.9 - 1.11.0. The problem is fixed in nginx 1.11.1, 1.10.1. Patch for nginx 1.9.13 - 1.11.0 can be found here: http://nginx.org/download/patch.2016.write.txt Patch for older nginx versions (1.3.9 - 1.9.12): http://nginx.org/download/patch.2016.write2.txt ------ Trusty, Vivid, Wily, Xenial, and Yakkety are affected, based on the NGINX upstream reported 'affected versions'. ** Changed in: nginx (Ubuntu Yakkety) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1587577 Title: Security Advisory - May 31 2016 - CVE-2016-4450 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1587577/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
