It was reported [1] that a heap overflow flaw in nginx's custom DNS resolver was corrected in upstream version 1.0.10 [2],[3]. This resolver is most commonly used with the proxy and fastcgi modules, which are not enabled by default. As well, a malicious user would need to be in control of an upstream resolver host, or be able to brute-force the weakly-generated 16-bit transaction identifier, to exploit the flaw. [1] http://seclists.org/oss-sec/2011/q4/323 [2] http://nginx.org/en/CHANGES-1.0 [3] http://trac.nginx.org/nginx/changeset/4268/nginx
Created nginx tracking bugs for this issue Affects: fedora-all [bug 754758] Affects: epel-all [bug 754759]
nginx-1.0.10-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
nginx-1.0.10-1.fc15 has been pushed to the Fedora 15 stable repository. If problems still persist, please make note of it in this bug report.