Back to bug 1302589
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Martin Prpič | 2016-01-28 08:43:55 UTC | Blocks | 1302591 | |
| Martin Prpič | 2016-01-28 08:44:49 UTC | Depends On | 1302592 | |
| Martin Prpič | 2016-01-28 08:47:29 UTC | Depends On | 1302334 | |
| Martin Prpič | 2016-01-28 08:47:48 UTC | Depends On | 1302337 | |
| Martin Prpič | 2016-01-28 08:54:41 UTC | Depends On | 1302599 | |
| Brandon Perkins | 2016-02-04 22:04:05 UTC | CC | bperkins | |
| Tomas Hoger | 2016-02-09 15:57:45 UTC | Whiteboard | impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-20,fedora-all/nginx=affected,epel-all/nginx=affected,rhscl-2/rh-nginx18-nginx=affected,rhscl-2/nginx16-nginx=affected | impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-20,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=defer,fedora-all/nginx=affected,epel-all/nginx=affected |
| Tomas Hoger | 2016-02-10 21:40:12 UTC | Doc Text | It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx cause use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled resolver in its configuration. | |
| Whiteboard | impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-20,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=defer,fedora-all/nginx=affected,epel-all/nginx=affected | impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=defer,fedora-all/nginx=affected,epel-all/nginx=affected | ||
| Martin Prpič | 2016-02-12 08:28:06 UTC | Doc Text | It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx cause use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled resolver in its configuration. | It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration. |
| Dhiru Kholia | 2016-06-03 09:04:46 UTC | Whiteboard | impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=defer,fedora-all/nginx=affected,epel-all/nginx=affected | impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=affected,rhscl-2/rh-nginx18-nginx=affected,fedora-all/nginx=affected,epel-all/nginx=affected |
| Dhiru Kholia | 2016-06-03 09:43:57 UTC | Depends On | 1342443 | |
| Dhiru Kholia | 2016-06-03 09:44:02 UTC | Depends On | 1342444 | |
| Dhiru Kholia | 2016-06-06 07:34:03 UTC | Depends On | 1342444 | |
| Dhiru Kholia | 2016-06-06 07:51:53 UTC | Whiteboard | impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=affected,rhscl-2/rh-nginx18-nginx=affected,fedora-all/nginx=affected,epel-all/nginx=affected | impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=affected,fedora-all/nginx=affected,epel-all/nginx=affected |
| Dhiru Kholia | 2016-07-14 11:21:41 UTC | Status | NEW | CLOSED |
| CC | dkholia | |||
| Resolution | --- | ERRATA | ||
| Last Closed | 2016-07-14 07:21:41 UTC | |||
| Product Security DevOps Team | 2019-09-29 13:43:28 UTC | Whiteboard | impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=affected,fedora-all/nginx=affected,epel-all/nginx=affected | |
| Jamie Nguyen | 2020-11-05 10:33:22 UTC | CC | jamielinux |
Back to bug 1302589