Security Issues Impacting NGINX: 1.8.x, 1.9.x
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
nginx (Debian) |
Fix Released
|
Unknown
|
|||
nginx (Ubuntu) |
Fix Released
|
Medium
|
Thomas Ward | ||
Precise |
Won't Fix
|
Medium
|
Unassigned | ||
Trusty |
Fix Released
|
Medium
|
Unassigned | ||
Vivid |
Won't Fix
|
Medium
|
Unassigned | ||
Wily |
Fix Released
|
Medium
|
Unassigned | ||
Xenial |
Fix Released
|
Medium
|
Thomas Ward |
Bug Description
This is listed as a Public Security bug as the CVEs and fixes have been announced by NGINX Upstream officially.
There are 3 CVEs impacting all versions of NGINX in Ubuntu. The following is taken from the upstream security announcement on the nginx-announce mailing list (http://
- Invalid pointer dereference might occur during DNS server response
processing, allowing an attacker who is able to forge UDP
packets from the DNS server to cause worker process crash
(CVE-2016-0742).
- Use-after-free condition might occur during CNAME response
processing. This problem allows an attacker who is able to trigger
name resolution to cause worker process crash, or might
have potential other impact (CVE-2016-0746).
- CNAME resolution was insufficiently limited, allowing an attacker who
is able to trigger arbitrary name resolution to cause excessive resource
consumption in worker processes (CVE-2016-0747).
The problems affect nginx 0.6.18 - 1.9.9 if the "resolver" directive
is used in a configuration file.
The problems are fixed in nginx 1.9.10, 1.8.1.
------
As stated prior, all versions of Ubuntu have an affected version of nginx. There are many commits done by upstream to fix these issues. There are at least 17 of which will need to be examined; as I examine the commits in the upstream commit logs, I will provide links to each commit here.
Xenial will very quickly get a fix, after I push an upload containing nginx 1.9.10 to the repositories.
Wily, having nginx 1.9.3, may be more receptive to patching without any type of changing of the patch to match code changes. This remains to be determined however.
Older versions of Ubuntu, Vivid and earlier, are likely less receptive to the patches, and may need re-engineered to apply to those code bases, given the age of those versions of nginx.
------
This is tracked in Debian as Debian Bug 812806:
https:/
Changed in nginx (Ubuntu Wily): | |
assignee: | nobody → Thomas Ward (teward) |
Changed in nginx (Ubuntu Precise): | |
assignee: | nobody → Thomas Ward (teward) |
Changed in nginx (Ubuntu Precise): | |
status: | New → Confirmed |
Changed in nginx (Ubuntu Trusty): | |
status: | New → Confirmed |
Changed in nginx (Ubuntu Vivid): | |
status: | New → Confirmed |
Changed in nginx (Ubuntu Wily): | |
status: | New → Confirmed |
Changed in nginx (Ubuntu Xenial): | |
status: | New → Confirmed |
description: | updated |
information type: | Private Security → Public Security |
Changed in nginx (Ubuntu Xenial): | |
status: | Confirmed → In Progress |
description: | updated |
tags: | added: trusty |
tags: | added: precise |
Changed in nginx (Ubuntu Precise): | |
importance: | Undecided → High |
Changed in nginx (Ubuntu Trusty): | |
importance: | Undecided → High |
Changed in nginx (Ubuntu Vivid): | |
importance: | Undecided → High |
Changed in nginx (Ubuntu Wily): | |
importance: | Undecided → High |
Changed in nginx (Ubuntu Xenial): | |
importance: | Undecided → High |
Changed in nginx (Ubuntu Vivid): | |
assignee: | Thomas Ward (teward) → nobody |
Changed in nginx (Ubuntu Trusty): | |
assignee: | Thomas Ward (teward) → nobody |
Changed in nginx (Ubuntu Precise): | |
assignee: | Thomas Ward (teward) → nobody |
Changed in nginx (Ubuntu Wily): | |
assignee: | Thomas Ward (teward) → nobody |
Changed in nginx (Debian): | |
status: | Unknown → Fix Released |
All versions of nginx in Ubuntu are affected.
------
This went out over the nginx-announce list:
Hello!
Several problems in nginx resolver were identified, which might
allow an attacker to cause worker process crash, or might have
potential other impact:
- Invalid pointer dereference might occur during DNS server response
processing, allowing an attacker who is able to forge UDP
packets from the DNS server to cause worker process crash
(CVE-2016-0742).
- Use-after-free condition might occur during CNAME response
processing. This problem allows an attacker who is able to trigger
name resolution to cause worker process crash, or might
have potential other impact (CVE-2016-0746).
- CNAME resolution was insufficiently limited, allowing an attacker who
is able to trigger arbitrary name resolution to cause excessive resource
consumption in worker processes (CVE-2016-0747).
The problems affect nginx 0.6.18 - 1.9.9 if the "resolver" directive
is used in a configuration file.
The problems are fixed in nginx 1.9.10, 1.8.1.
-- nginx.org/
Maxim Dounin
http://