-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.1744
                Moderate: rh-nginx18-nginx security update
                               15 July 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rh-nginx18-nginx
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
                   Red Hat Enterprise Linux Server 7
                   Red Hat Enterprise Linux WS/Desktop 7
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Denial of Service               -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2016-4450 CVE-2016-0747 CVE-2016-0746
                   CVE-2016-0742  

Reference:         ESB-2016.1385
                   ESB-2016.0350

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2016:1425

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: rh-nginx18-nginx security update
Advisory ID:       RHSA-2016:1425-01
Product:           Red Hat Software Collections
Advisory URL:      https://access.redhat.com/errata/RHSA-2016:1425
Issue date:        2016-07-14
CVE Names:         CVE-2016-0742 CVE-2016-0746 CVE-2016-0747 
                   CVE-2016-4450 
=====================================================================

1. Summary:

An update for rh-nginx18-nginx is now available for Red Hat Software
Collections.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6) - x86_64
Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

Nginx is a web and proxy server with a focus on high concurrency,
performance, and low memory usage.

The following packages have been upgraded to a newer upstream version:
rh-nginx18-nginx (1.8.1).

Security Fix(es):

* A NULL pointer dereference flaw was found in the nginx code responsible
for saving client request body to a temporary file. A remote attacker could
send a specially crafted request that would cause nginx worker process to
crash. (CVE-2016-4450)

* It was discovered that nginx could perform an out of bound read and
dereference an invalid pointer when resolving CNAME DNS records. An
attacker able to manipulate DNS responses received by nginx could use this
flaw to cause a worker process to crash if nginx enabled the resolver in
its configuration. (CVE-2016-0742)

* A use-after-free flaw was found in the way nginx resolved certain CNAME
DNS records. An attacker able to manipulate DNS responses received by nginx
could use this flaw to cause a worker process to crash or, possibly,
execute arbitrary code if nginx enabled the resolver in its configuration.
(CVE-2016-0746)

* It was discovered that nginx did not limit recursion when resolving CNAME
DNS records. An attacker able to manipulate DNS responses received by nginx
could use this flaw to cause a worker process to use an excessive amount of
resources if nginx enabled the resolver in its configuration.
(CVE-2016-0747)

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

The rh-nginx18-nginx service must be restarted for this update to take
effect.

5. Bugs fixed (https://bugzilla.redhat.com/):

1302587 - CVE-2016-0742 nginx: invalid pointer dereference in resolver
1302588 - CVE-2016-0746 nginx: use-after-free during CNAME response processing in resolver
1302589 - CVE-2016-0747 nginx: Insufficient limits of CNAME resolution in resolver
1341462 - CVE-2016-4450 nginx: NULL pointer dereference while writing client request body

6. Package List:

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6):

Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm

x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6):

Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm

x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7):

Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm

x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6):

Source:
rh-nginx18-nginx-1.8.1-1.el6.src.rpm

x86_64:
rh-nginx18-nginx-1.8.1-1.el6.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el6.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7):

Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm

x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1):

Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm

x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2):

Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm

x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm

Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-nginx18-nginx-1.8.1-1.el7.src.rpm

x86_64:
rh-nginx18-nginx-1.8.1-1.el7.x86_64.rpm
rh-nginx18-nginx-debuginfo-1.8.1-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2016-0742
https://access.redhat.com/security/cve/CVE-2016-0746
https://access.redhat.com/security/cve/CVE-2016-0747
https://access.redhat.com/security/cve/CVE-2016-4450
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFXhy2gXlSAg2UNWIIRAjOgAJ9QjuFMrvK50IeJq8Ky7VkefuMBUwCeM+Cp
ZhbDRXs2sdXbnakZ6oJi/K8=
=7RBd
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=avHF
-----END PGP SIGNATURE-----