[USN-3812-1] nginx vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”VWnc0jZCaW2hyftp8JOr9Gi8cvdvOy7zh”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–VWnc0jZCaW2hyftp8JOr9Gi8cvdvOy7zh

protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3812-1] nginx vulnerabilities

–zBsC5R91J0dqlZxjvmxfhD2QRBiGgzhK5

Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=
=

Ubuntu Security Notice USN-3812-1
November 07, 2018

nginx vulnerabilities
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in nginx.

Software Description:
– nginx: small, powerful, scalable web/proxy server

Details:

It was discovered that nginx incorrectly handled the HTTP/2 implementatio=
n.
A remote attacker could possibly use this issue to cause excessive memory=

consumption, leading to a denial of service. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10. (CVE-2018-16843)

Gal Goldshtein discovered that nginx incorrectly handled the HTTP/2
implementation. A remote attacker could possibly use this issue to cause
excessive CPU usage, leading to a denial of service. This issue only
affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 18.10.
(CVE-2018-16844)

It was discovered that nginx incorrectly handled the ngx_http_mp4_module
module. A remote attacker could possibly use this issue with a specially
crafted mp4 file to cause nginx to crash, stop responding, or access
arbitrary memory. (CVE-2018-16845)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
nginx-common 1.15.5-0ubuntu2.1
nginx-core 1.15.5-0ubuntu2.1
nginx-extras 1.15.5-0ubuntu2.1
nginx-full 1.15.5-0ubuntu2.1
nginx-light 1.15.5-0ubuntu2.1

Ubuntu 18.04 LTS:
nginx-common 1.14.0-0ubuntu1.2
nginx-core 1.14.0-0ubuntu1.2
nginx-extras 1.14.0-0ubuntu1.2
nginx-full 1.14.0-0ubuntu1.2
nginx-light 1.14.0-0ubuntu1.2

Ubuntu 16.04 LTS:
nginx-common 1.10.3-0ubuntu0.16.04.3
nginx-core 1.10.3-0ubuntu0.16.04.3
nginx-extras 1.10.3-0ubuntu0.16.04.3
nginx-full 1.10.3-0ubuntu0.16.04.3
nginx-light 1.10.3-0ubuntu0.16.04.3

Ubuntu 14.04 LTS:
nginx-common 1.4.6-1ubuntu3.9
nginx-core 1.4.6-1ubuntu3.9
nginx-extras 1.4.6-1ubuntu3.9
nginx-full 1.4.6-1ubuntu3.9
nginx-light 1.4.6-1ubuntu3.9

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3812-1
CVE-2018-16843, CVE-2018-16844, CVE-2018-16845

Package Information:
https://launchpad.net/ubuntu/+source/nginx/1.15.5-0ubuntu2.1
https://launchpad.net/ubuntu/+source/nginx/1.14.0-0ubuntu1.2
https://launchpad.net/ubuntu/+source/nginx/1.10.3-0ubuntu0.16.04.3
https://launchpad.net/ubuntu/+source/nginx/1.4.6-1ubuntu3.9

–zBsC5R91J0dqlZxjvmxfhD2QRBiGgzhK5–

–VWnc0jZCaW2hyftp8JOr9Gi8cvdvOy7zh

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–
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=VVqU
—–END PGP SIGNATURE—–

–VWnc0jZCaW2hyftp8JOr9Gi8cvdvOy7zh–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK