[Bug 1538165] Re: Security Issues Impacting NGINX: 1.8.x, 1.9.x

Thomas Ward teward at trekweb.org
Tue Jan 26 17:56:46 UTC 2016


** Description changed:

- This is listed as a Private Security bug as it contains some security
- content, but does not contain specifics due to Upstream not releasing
- them, and also at Upstream's request to keep notifications about issues
- not yet known to the public quiet.
+ This is listed as a Public Security bug as the CVEs and fixes have been
+ announced by NGINX Upstream officially.
  
- It was told to me from NGINX Upstream by Andrew Hutchings (the Technical
- Product Manager at NGINX Inc, the company behind the nginx web server)
- that there is an update releasing for NGINX that addresses some security
- issues, with CVE information to be made available once the release is
- made.  The releases containing fixes for these issues are 1.8.1 for the
- Stable branch, and 1.9.10 for the Mainline branch.
+ There are 3 CVEs impacting all versions of NGINX in Ubuntu.  The
+ following is taken from the upstream security announcement on the nginx-
+ announce mailing list:
  
- These issues are NOT yet available for me to review, and therefore
- security content of these issues remains secret to me.
+ - Invalid pointer dereference might occur during DNS server response
+  processing, allowing an attacker who is able to forge UDP
+  packets from the DNS server to cause worker process crash
+  (CVE-2016-0742).
  
- This bug here is made as a tracker for pending state on this, as well as
- to have the information stored for the issues affecting NGINX in Ubuntu.
+ - Use-after-free condition might occur during CNAME response
+  processing. This problem allows an attacker who is able to trigger
+  name resolution to cause worker process crash, or might
+  have potential other impact (CVE-2016-0746).
  
- Without specific details, I can say with some certainty that NGINX 1.9.0
- and later are affected, which means Wily and Xenial are both affected.
- Once more data is available, CVEs will be added here as well as other
- information related to these CVEs, and we can determine what needs to be
- fixed where after that information is available.
+ - CNAME resolution was insufficiently limited, allowing an attacker who
+  is able to trigger arbitrary name resolution to cause excessive resource
+  consumption in worker processes (CVE-2016-0747).
  
- I am assigning myself currently to track this, as the NGINX release is
- expected today (January 26, 2016) at some time according to Andrew, and
- that release will have details available there as well as fixes.
+ The problems affect nginx 0.6.18 - 1.9.9 if the "resolver" directive
+ is used in a configuration file.
+ 
+ The problems are fixed in nginx 1.9.10, 1.8.1.
+ 
+ ------
+ 
+ As stated prior, all versions of Ubuntu have an affected version of
+ nginx.  There are many commits done by upstream to fix these issues.
+ There are at least 17 of which will need to be examined; as I examine
+ the commits in the upstream commit logs, I will provide links to each
+ commit here.
+ 
+ Xenial will very quickly get a fix, after I push an upload containing
+ nginx 1.9.10 to the repositories.
+ 
+ Wily, having nginx 1.9.3, may be more receptive to patching without any
+ type of changing of the patch to match code changes.  This remains to be
+ determined however.
+ 
+ Older versions of Ubuntu, Vivid and earlier, are likely less receptive
+ to the patches, and may need re-engineered to apply to those code bases,
+ given the age of those versions of nginx.

** Information type changed from Private Security to Public Security

** Changed in: nginx (Ubuntu Xenial)
       Status: Confirmed => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nginx in Ubuntu.
https://bugs.launchpad.net/bugs/1538165

Title:
  Security Issues Impacting NGINX: 1.8.x, 1.9.x

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1538165/+subscriptions



More information about the Ubuntu-server-bugs mailing list