Arch Linux Security Advisory ASA-201606-2
========================================
Severity: Medium
Date    : 2016-06-01
CVE-ID  : CVE-2016-4450
Package : nginx-mainline
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package nginx-mainline before version 1.11.1-1 is vulnerable to
denial of service.

Resolution
=========
Upgrade to 1.11.1-1.

# pacman -Syu "nginx-mainline>=1.11.1-1"

The problem has been fixed upstream in version 1.11.1.

Workaround
=========
None.

Description
==========
A vulnerability was found in nginx code responsible for saving client
request body to a temporary file. A specially crafted request might
result in worker process crash due to a NULL pointer dereference while
handling the client request body.

Impact
=====
A remote attacker is able to use a specially crafted request to crash
the worker resulting in denial of service.

References
=========
https://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html
https://access.redhat.com/security/cve/CVE-2016-4450

ArchLinux: 201606-2: nginx-mainline: denial of service

June 1, 2016

Summary

A vulnerability was found in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while handling the client request body.

Resolution

Upgrade to 1.11.1-1. # pacman -Syu "nginx-mainline>=1.11.1-1"
The problem has been fixed upstream in version 1.11.1.

References

https://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html https://access.redhat.com/security/cve/CVE-2016-4450

Severity
Package : nginx-mainline
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE

Workaround

None.

Related News