Security update for nginx-1.0
Announcement ID: | SUSE-SU-2016:1232-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities can now be installed.
Description:
This update for nginx-1.0 fixes the following issues:
Security fixes: - CVE-2016-0742: Invalid pointer dereference during DNS server response processing - CVE-2016-0747: Resource exhaustion through unlimited CNAME resolution - CVE-2016-0746: Use-after-free condition during CNAME response processing
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Studio Onsite 1.3
zypper in -t patch slestso13-nginx-1.0-12540=1
-
WebYaST for SLE-11 1.3
zypper in -t patch slewyst13-nginx-1.0-12540=1
-
SLES for SAP Applications 11-SP4
zypper in -t patch slewyst13-nginx-1.0-12540=1
Package List:
-
SUSE Studio Onsite 1.3 (x86_64)
- libGeoIP1-1.4.7-2.10.1
- nginx-1.0-1.0.15-0.29.2
-
WebYaST for SLE-11 1.3 (s390x x86_64 i586 ppc64 ia64)
- GeoIP-1.4.7-2.10.1
- libGeoIP1-1.4.7-2.10.1
- nginx-1.0-1.0.15-0.29.2
-
SLES for SAP Applications 11-SP4 (ppc64 x86_64)
- GeoIP-1.4.7-2.10.1
- libGeoIP1-1.4.7-2.10.1
- nginx-1.0-1.0.15-0.29.2
References:
- https://www.suse.com/security/cve/CVE-2016-0742.html
- https://www.suse.com/security/cve/CVE-2016-0746.html
- https://www.suse.com/security/cve/CVE-2016-0747.html
- https://bugzilla.suse.com/show_bug.cgi?id=963775
- https://bugzilla.suse.com/show_bug.cgi?id=963778
- https://bugzilla.suse.com/show_bug.cgi?id=963781