Back to bug 1302589

Who When What Removed Added
Martin Prpič 2016-01-28 08:43:55 UTC Blocks 1302591
Martin Prpič 2016-01-28 08:44:49 UTC Depends On 1302592
Martin Prpič 2016-01-28 08:47:29 UTC Depends On 1302334
Martin Prpič 2016-01-28 08:47:48 UTC Depends On 1302337
Martin Prpič 2016-01-28 08:54:41 UTC Depends On 1302599
Brandon Perkins 2016-02-04 22:04:05 UTC CC bperkins
Tomas Hoger 2016-02-09 15:57:45 UTC Whiteboard impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-20,fedora-all/nginx=affected,epel-all/nginx=affected,rhscl-2/rh-nginx18-nginx=affected,rhscl-2/nginx16-nginx=affected impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-20,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=defer,fedora-all/nginx=affected,epel-all/nginx=affected
Tomas Hoger 2016-02-10 21:40:12 UTC Doc Text It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx cause use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled resolver in its configuration.
Whiteboard impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-20,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=defer,fedora-all/nginx=affected,epel-all/nginx=affected impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=defer,fedora-all/nginx=affected,epel-all/nginx=affected
Martin Prpič 2016-02-12 08:28:06 UTC Doc Text It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx cause use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled resolver in its configuration. It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration.
Dhiru Kholia 2016-06-03 09:04:46 UTC Whiteboard impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=defer,fedora-all/nginx=affected,epel-all/nginx=affected impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=affected,rhscl-2/rh-nginx18-nginx=affected,fedora-all/nginx=affected,epel-all/nginx=affected
Dhiru Kholia 2016-06-03 09:43:57 UTC Depends On 1342443
Dhiru Kholia 2016-06-03 09:44:02 UTC Depends On 1342444
Dhiru Kholia 2016-06-06 07:34:03 UTC Depends On 1342444
Dhiru Kholia 2016-06-06 07:51:53 UTC Whiteboard impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=affected,rhscl-2/rh-nginx18-nginx=affected,fedora-all/nginx=affected,epel-all/nginx=affected impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=affected,fedora-all/nginx=affected,epel-all/nginx=affected
Dhiru Kholia 2016-07-14 11:21:41 UTC Status NEW CLOSED
CC dkholia
Resolution --- ERRATA
Last Closed 2016-07-14 07:21:41 UTC
Product Security DevOps Team 2019-09-29 13:43:28 UTC Whiteboard impact=moderate,public=20160126,reported=20160126,source=internet,cvss2=4.3/AV:N/AC:M/Au:N/C:N/I:N/A:P,cwe=CWE-400,rhscl-2/nginx16-nginx=wontfix,rhscl-2/rh-nginx18-nginx=affected,fedora-all/nginx=affected,epel-all/nginx=affected
Jamie Nguyen 2020-11-05 10:33:22 UTC CC jamielinux

Back to bug 1302589