First published: Fri Nov 20 2009(Updated: )
engine x (nginx) contains a null pointer dereference flaw in versions 0.1.0-0.8.13 before versions 0.8.14, 0.7.62, 0.6.39 and 0.5.38. <a href="http://nginx.net/">http://nginx.net/</a> <a href="http://marc.info/?l=nginx&m=125692080328141&w=2">http://marc.info/?l=nginx&m=125692080328141&w=2</a> <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=552035</a> <a href="http://www.debian.org/security/2009/dsa-1920">http://www.debian.org/security/2009/dsa-1920</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Nginx | <0.8.14>=0.1.0<0.8.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-539565 is considered to be high due to the potential for denial of service.
To fix REDHAT-BUG-539565, upgrade Nginx to versions 0.8.14, 0.7.62, 0.6.39, or 0.5.38 or later.
Versions of Nginx from 0.1.0 up to and including 0.8.13 are affected by REDHAT-BUG-539565.
A null pointer dereference flaw in REDHAT-BUG-539565 can lead to application crashes, resulting in service disruption.
No, REDHAT-BUG-539565 is not present in the latest Nginx releases as they have addressed this vulnerability.