USN-2892-1: nginx vulnerabilities
9 February 2016
Several security issues were fixed in nginx.
Releases
Packages
- nginx - small, powerful, scalable web/proxy server
Details
It was discovered that nginx incorrectly handled certain DNS server
responses when the resolver is enabled. A remote attacker could possibly
use this issue to cause nginx to crash, resulting in a denial of service.
(CVE-2016-0742)
It was discovered that nginx incorrectly handled CNAME response processing
when the resolver is enabled. A remote attacker could use this issue to
cause nginx to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2016-0746)
It was discovered that nginx incorrectly handled CNAME resolution when
the resolver is enabled. A remote attacker could possibly use this issue to
cause nginx to consume resources, resulting in a denial of service.
(CVE-2016-0747)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.10
-
nginx-core
-
1.9.3-1ubuntu1.1
-
nginx-extras
-
1.9.3-1ubuntu1.1
-
nginx-full
-
1.9.3-1ubuntu1.1
-
nginx-light
-
1.9.3-1ubuntu1.1
Ubuntu 14.04
-
nginx-core
-
1.4.6-1ubuntu3.4
-
nginx-extras
-
1.4.6-1ubuntu3.4
-
nginx-full
-
1.4.6-1ubuntu3.4
-
nginx-light
-
1.4.6-1ubuntu3.4
-
nginx-naxsi
-
1.4.6-1ubuntu3.4
In general, a standard system update will make all the necessary changes.