A vulnerability was found in nginx code responsible for saving client request body to a temporary file. A specially crafted request might result in worker process crash due to a NULL pointer dereference while writing client request body to a temporary file. External references: http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html Upstream patches: [nginx 1.9.13 - 1.11.0] http://nginx.org/download/patch.2016.write.txt [nginx 1.3.9 - 1.9.12] http://nginx.org/download/patch.2016.write2.txt
Created nginx tracking bugs for this issue: Affects: fedora-all [bug 1341463] Affects: epel-all [bug 1341464]
Upstream bug, https://trac.nginx.org/nginx/ticket/981
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7.2 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.1 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 6.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS Via RHSA-2016:1425 https://access.redhat.com/errata/RHSA-2016:1425
nginx-1.10.1-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
nginx-1.10.1-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.