Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in nginx
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in nginx
ID: USN-3812-1
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10
Datum: Mi, 7. November 2018, 22:53
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16844
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16843
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16845
Applikationen: nginx

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6552906120628298571==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="VWnc0jZCaW2hyftp8JOr9Gi8cvdvOy7zh"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--VWnc0jZCaW2hyftp8JOr9Gi8cvdvOy7zh
Content-Type: multipart/mixed;
boundary="zBsC5R91J0dqlZxjvmxfhD2QRBiGgzhK5";
protected-headers="v1"
From: Marc Deslauriers <marc.deslauriers@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <dd454f60-e6c2-c0a3-4be5-a193f41fc05d@canonical.com>
Subject: [USN-3812-1] nginx vulnerabilities

--zBsC5R91J0dqlZxjvmxfhD2QRBiGgzhK5
Content-Type: text/plain; charset=utf-8
Content-Language: en-C
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-3812-1
November 07, 2018

nginx vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in nginx.

Software Description:
- nginx: small, powerful, scalable web/proxy server

Details:

It was discovered that nginx incorrectly handled the HTTP/2 implementation.
A remote attacker could possibly use this issue to cause excessive memory
consumption, leading to a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-16843)

Gal Goldshtein discovered that nginx incorrectly handled the HTTP/2
implementation. A remote attacker could possibly use this issue to cause
excessive CPU usage, leading to a denial of service. This issue only
affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10.
(CVE-2018-16844)

It was discovered that nginx incorrectly handled the ngx_http_mp4_module
module. A remote attacker could possibly use this issue with a specially
crafted mp4 file to cause nginx to crash, stop responding, or access
arbitrary memory. (CVE-2018-16845)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
nginx-common 1.15.5-0ubuntu2.1
nginx-core 1.15.5-0ubuntu2.1
nginx-extras 1.15.5-0ubuntu2.1
nginx-full 1.15.5-0ubuntu2.1
nginx-light 1.15.5-0ubuntu2.1

Ubuntu 18.04 LTS:
nginx-common 1.14.0-0ubuntu1.2
nginx-core 1.14.0-0ubuntu1.2
nginx-extras 1.14.0-0ubuntu1.2
nginx-full 1.14.0-0ubuntu1.2
nginx-light 1.14.0-0ubuntu1.2

Ubuntu 16.04 LTS:
nginx-common 1.10.3-0ubuntu0.16.04.3
nginx-core 1.10.3-0ubuntu0.16.04.3
nginx-extras 1.10.3-0ubuntu0.16.04.3
nginx-full 1.10.3-0ubuntu0.16.04.3
nginx-light 1.10.3-0ubuntu0.16.04.3

Ubuntu 14.04 LTS:
nginx-common 1.4.6-1ubuntu3.9
nginx-core 1.4.6-1ubuntu3.9
nginx-extras 1.4.6-1ubuntu3.9
nginx-full 1.4.6-1ubuntu3.9
nginx-light 1.4.6-1ubuntu3.9

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3812-1
CVE-2018-16843, CVE-2018-16844, CVE-2018-16845

Package Information:
https://launchpad.net/ubuntu/+source/nginx/1.15.5-0ubuntu2.1
https://launchpad.net/ubuntu/+source/nginx/1.14.0-0ubuntu1.2
https://launchpad.net/ubuntu/+source/nginx/1.10.3-0ubuntu0.16.04.3
https://launchpad.net/ubuntu/+source/nginx/1.4.6-1ubuntu3.9


--zBsC5R91J0dqlZxjvmxfhD2QRBiGgzhK5--

--VWnc0jZCaW2hyftp8JOr9Gi8cvdvOy7zh
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAlvjC2AACgkQZWnYVadE
vpONHw/+MT0emCyBVxux0gfJQVwGvtFAb9PKv4bNf0D6D3aa0N3tLAsqnLrBTCmv
3rN2S89cpl+znSRcxGMf82RYvIcXijBTy5/K3Ag2sGhIqEXl7+KpMvBcWkZxlrXc
lJH6u82ac5mFbrlxB66g12h0FNiOZrJ+sjtuV56uIwfQjOJrAtcLikTCx8MWTiMR
317d7utOUpp6LAr5Tm0mUS1wl9bX4boJyCdP6AAoN3xUK11X4xM2+r2YbJrpIj1R
Suvbj8Ci+xalZWWEVKCMgXasyTVVICe/iQArGj4uL6sbPhpsloqHugYD0CK8jkVH
zomdK127PQjeJOvVEBcZNlHUJNQs3Ysm5OE/dXjOsMNpfxi4wEImt8uZlJBI5p7a
v38KVQgV+/tD7ZynXKO1b4ISCa+zN0ARjC/79qPOudkFGetl5IAKcjmm3ljYsJcp
UYCUiBExZuF0HNVnJRkqxqRduohl0/v7N7QdaIj2X/mq9RFDYXv96kdfy0EOp2DQ
GGeVZRpFlqoRkpExDFbGO5yPPpUuUx088HRjokB0AktZG57TrCMR6OizZnCB6JvC
OSOkc7FCEwKU0BNCTgRLqZF8cWNyA83Z554+1/3FSWnVcfpMcFG8t1U2dPQkxUKW
QxNqfW33ALLvalCgmWMy96vjs8N2Sf2jm4ofABVwz6Sy1zsRwyc=
=VVqU
-----END PGP SIGNATURE-----

--VWnc0jZCaW2hyftp8JOr9Gi8cvdvOy7zh--


--===============6552906120628298571==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============6552906120628298571==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung