*** This bug is a security vulnerability ***

Public security bug reported:

The following was put out in a security advisory notice over nginx-
announce's mailing list today:

http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html

Hello!

A security issue was identified in the ngx_http_mp4_module, which might
allow an attacker to cause infinite loop in a worker process, cause a
worker process crash, or might result in worker process memory
disclosure by using a specially crafted mp4 file (CVE-2018-16845).

The issue only affects nginx if it is built with the ngx_http_mp4_module
(the module is not built by default) and the "mp4" directive is used in
the configuration file.  Further, the attack is only possible if an
attacker is able to trigger processing of a specially crafted mp4 file
with the ngx_http_mp4_module.

The issue affects nginx 1.1.3+, 1.0.7+.
The issue is fixed in 1.15.6, 1.14.1.

Patch for the issue can be found here:

http://nginx.org/download/patch.2018.mp4.txt

------

Based on the version strings specified, the following Ubuntu versions of
nginx are affected:

* Trusty (1.4.6-1ubuntu3, 1.4.6-1ubuntu3.8)
* Xenial (1.9.15-0ubuntu1, 1.10.3-0ubuntu0.16.04.2)
* Bionic (1.14.0-0ubuntu1, 1.14.0-0ubuntu1.1)
* Cosmic (1.15.0-0ubuntu1, 1.15.0-0ubuntu2)
* Disco (1.15.0-0ubuntu1, 1.15.0-0ubuntu3)

** Affects: nginx (Ubuntu)
     Importance: Medium
     Assignee: Thomas Ward (teward)
         Status: Confirmed

** Affects: nginx (Ubuntu Trusty)
     Importance: Medium
         Status: Confirmed

** Affects: nginx (Ubuntu Xenial)
     Importance: Medium
         Status: Confirmed

** Affects: nginx (Ubuntu Bionic)
     Importance: Medium
         Status: Confirmed

** Affects: nginx (Ubuntu Cosmic)
     Importance: Medium
         Status: Confirmed

** Affects: nginx (Ubuntu Disco)
     Importance: Medium
     Assignee: Thomas Ward (teward)
         Status: Confirmed

** Changed in: nginx (Ubuntu)
       Status: New => Confirmed

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16845

** Also affects: nginx (Ubuntu Trusty)
   Importance: Undecided
       Status: New

** Also affects: nginx (Ubuntu Disco)
   Importance: Undecided
       Status: Confirmed

** Also affects: nginx (Ubuntu Cosmic)
   Importance: Undecided
       Status: New

** Also affects: nginx (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Also affects: nginx (Ubuntu Bionic)
   Importance: Undecided
       Status: New

** Changed in: nginx (Ubuntu Cosmic)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu Bionic)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu Xenial)
       Status: New => Confirmed

** Changed in: nginx (Ubuntu Trusty)
       Status: New => Confirmed

** Description changed:

  The following was put out in a security advisory notice over nginx-
  announce's mailing list today:
+ 
+ http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html
  
  Hello!
  
  A security issue was identified in the ngx_http_mp4_module, which might
  allow an attacker to cause infinite loop in a worker process, cause a
  worker process crash, or might result in worker process memory
  disclosure by using a specially crafted mp4 file (CVE-2018-16845).
  
  The issue only affects nginx if it is built with the ngx_http_mp4_module
  (the module is not built by default) and the "mp4" directive is used in
  the configuration file.  Further, the attack is only possible if an
  attacker is able to trigger processing of a specially crafted mp4 file
  with the ngx_http_mp4_module.
  
  The issue affects nginx 1.1.3+, 1.0.7+.
  The issue is fixed in 1.15.6, 1.14.1.
  
  Patch for the issue can be found here:
  
  http://nginx.org/download/patch.2018.mp4.txt
  
  ------
  
  Based on the version strings specified, the following Ubuntu versions of
  nginx are affected:
  
  * Trusty (1.4.6-1ubuntu3, 1.4.6-1ubuntu3.8)
  * Xenial (1.9.15-0ubuntu1, 1.10.3-0ubuntu0.16.04.2)
  * Bionic (1.14.0-0ubuntu1, 1.14.0-0ubuntu1.1)
  * Cosmic (1.15.0-0ubuntu1, 1.15.0-0ubuntu2)
  * Disco (1.15.0-0ubuntu1, 1.15.0-0ubuntu3)

** Changed in: nginx (Ubuntu Trusty)
   Importance: Undecided => Medium

** Changed in: nginx (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: nginx (Ubuntu Bionic)
   Importance: Undecided => Medium

** Changed in: nginx (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: nginx (Ubuntu Cosmic)
   Importance: Undecided => Medium

** Changed in: nginx (Ubuntu Disco)
     Assignee: (unassigned) => Thomas Ward (teward)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1801983

Title:
  Security Advisory - Nov. 6, 2018 - CVE-2018-16845

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1801983/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to