Ubuntu Security Notice 2892-1 - It was discovered that nginx incorrectly handled certain DNS server responses when the resolver is enabled. A remote attacker could possibly use this issue to cause nginx to crash, resulting in a denial of service. It was discovered that nginx incorrectly handled CNAME response processing when the resolver is enabled. A remote attacker could use this issue to cause nginx to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
d6dd860ad160022d340ae51100f95d1bbfc7eb1318e96733778075f22b98232b
============================================================================
Ubuntu Security Notice USN-2892-1
February 09, 2016
nginx vulnerabilities
============================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.10
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in nginx.
Software Description:
- nginx: small, powerful, scalable web/proxy server
Details:
It was discovered that nginx incorrectly handled certain DNS server
responses when the resolver is enabled. A remote attacker could possibly
use this issue to cause nginx to crash, resulting in a denial of service.
(CVE-2016-0742)
It was discovered that nginx incorrectly handled CNAME response processing
when the resolver is enabled. A remote attacker could use this issue to
cause nginx to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2016-0746)
It was discovered that nginx incorrectly handled CNAME resolution when
the resolver is enabled. A remote attacker could possibly use this issue to
cause nginx to consume resources, resulting in a denial of service.
(CVE-2016-0747)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.10:
nginx-core 1.9.3-1ubuntu1.1
nginx-extras 1.9.3-1ubuntu1.1
nginx-full 1.9.3-1ubuntu1.1
nginx-light 1.9.3-1ubuntu1.1
Ubuntu 14.04 LTS:
nginx-core 1.4.6-1ubuntu3.4
nginx-extras 1.4.6-1ubuntu3.4
nginx-full 1.4.6-1ubuntu3.4
nginx-light 1.4.6-1ubuntu3.4
nginx-naxsi 1.4.6-1ubuntu3.4
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2892-1
CVE-2016-0742, CVE-2016-0746, CVE-2016-0747
Package Information:
https://launchpad.net/ubuntu/+source/nginx/1.9.3-1ubuntu1.1
https://launchpad.net/ubuntu/+source/nginx/1.4.6-1ubuntu3.4