First published: Wed Jun 01 2016(Updated: )
A vulnerability was found in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while writing client request body to a temporary file. External references: <a href="http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html">http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html</a> Upstream patches: [nginx 1.9.13 - 1.11.0] <a href="http://nginx.org/download/patch.2016.write.txt">http://nginx.org/download/patch.2016.write.txt</a> [nginx 1.3.9 - 1.9.12] <a href="http://nginx.org/download/patch.2016.write2.txt">http://nginx.org/download/patch.2016.write2.txt</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nginx | <1.11.1 | 1.11.1 |
redhat/nginx | <1.10.1 | 1.10.1 |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Canonical Ubuntu Linux | =16.04 | |
F5 Nginx | >=1.3.9<1.10.1 | |
F5 Nginx | =1.11.0 | |
Debian Debian Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.