Activity log for bug #1801983
Date | Who | What changed | Old value | New value | Message |
---|---|---|---|---|---|
2018-11-06 18:15:48 | Thomas Ward | bug | added bug | ||
2018-11-06 18:15:55 | Thomas Ward | nginx (Ubuntu): status | New | Confirmed | |
2018-11-06 18:16:10 | Thomas Ward | cve linked | 2018-16845 | ||
2018-11-06 18:16:18 | Thomas Ward | nominated for series | Ubuntu Trusty | ||
2018-11-06 18:16:18 | Thomas Ward | bug task added | nginx (Ubuntu Trusty) | ||
2018-11-06 18:16:18 | Thomas Ward | nominated for series | Ubuntu Disco | ||
2018-11-06 18:16:18 | Thomas Ward | bug task added | nginx (Ubuntu Disco) | ||
2018-11-06 18:16:18 | Thomas Ward | nominated for series | Ubuntu Cosmic | ||
2018-11-06 18:16:18 | Thomas Ward | bug task added | nginx (Ubuntu Cosmic) | ||
2018-11-06 18:16:18 | Thomas Ward | nominated for series | Ubuntu Xenial | ||
2018-11-06 18:16:18 | Thomas Ward | bug task added | nginx (Ubuntu Xenial) | ||
2018-11-06 18:16:18 | Thomas Ward | nominated for series | Ubuntu Bionic | ||
2018-11-06 18:16:18 | Thomas Ward | bug task added | nginx (Ubuntu Bionic) | ||
2018-11-06 18:16:24 | Thomas Ward | nginx (Ubuntu Cosmic): status | New | Confirmed | |
2018-11-06 18:16:26 | Thomas Ward | nginx (Ubuntu Bionic): status | New | Confirmed | |
2018-11-06 18:16:27 | Thomas Ward | nginx (Ubuntu Xenial): status | New | Confirmed | |
2018-11-06 18:16:29 | Thomas Ward | nginx (Ubuntu Trusty): status | New | Confirmed | |
2018-11-06 18:18:27 | Thomas Ward | description | The following was put out in a security advisory notice over nginx-announce's mailing list today: Hello! A security issue was identified in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file (CVE-2018-16845). The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the "mp4" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module. The issue affects nginx 1.1.3+, 1.0.7+. The issue is fixed in 1.15.6, 1.14.1. Patch for the issue can be found here: http://nginx.org/download/patch.2018.mp4.txt ------ Based on the version strings specified, the following Ubuntu versions of nginx are affected: * Trusty (1.4.6-1ubuntu3, 1.4.6-1ubuntu3.8) * Xenial (1.9.15-0ubuntu1, 1.10.3-0ubuntu0.16.04.2) * Bionic (1.14.0-0ubuntu1, 1.14.0-0ubuntu1.1) * Cosmic (1.15.0-0ubuntu1, 1.15.0-0ubuntu2) * Disco (1.15.0-0ubuntu1, 1.15.0-0ubuntu3) | The following was put out in a security advisory notice over nginx-announce's mailing list today: http://mailman.nginx.org/pipermail/nginx-announce/2018/000221.html Hello! A security issue was identified in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file (CVE-2018-16845). The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the "mp4" directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module. The issue affects nginx 1.1.3+, 1.0.7+. The issue is fixed in 1.15.6, 1.14.1. Patch for the issue can be found here: http://nginx.org/download/patch.2018.mp4.txt ------ Based on the version strings specified, the following Ubuntu versions of nginx are affected: * Trusty (1.4.6-1ubuntu3, 1.4.6-1ubuntu3.8) * Xenial (1.9.15-0ubuntu1, 1.10.3-0ubuntu0.16.04.2) * Bionic (1.14.0-0ubuntu1, 1.14.0-0ubuntu1.1) * Cosmic (1.15.0-0ubuntu1, 1.15.0-0ubuntu2) * Disco (1.15.0-0ubuntu1, 1.15.0-0ubuntu3) | |
2018-11-06 18:23:50 | Thomas Ward | nginx (Ubuntu Trusty): importance | Undecided | Medium | |
2018-11-06 18:23:51 | Thomas Ward | nginx (Ubuntu Xenial): importance | Undecided | Medium | |
2018-11-06 18:23:52 | Thomas Ward | nginx (Ubuntu Bionic): importance | Undecided | Medium | |
2018-11-06 18:23:54 | Thomas Ward | nginx (Ubuntu Disco): importance | Undecided | Medium | |
2018-11-06 18:23:56 | Thomas Ward | nginx (Ubuntu Cosmic): importance | Undecided | Medium | |
2018-11-06 18:24:10 | Thomas Ward | nginx (Ubuntu Disco): assignee | Thomas Ward (teward) | ||
2018-11-07 16:06:47 | Thomas Ward | nginx (Ubuntu Trusty): status | Confirmed | Fix Released | |
2018-11-07 16:06:48 | Thomas Ward | nginx (Ubuntu Xenial): status | Confirmed | Fix Released | |
2018-11-07 16:06:49 | Thomas Ward | nginx (Ubuntu Bionic): status | Confirmed | Fix Released | |
2018-11-07 16:06:51 | Thomas Ward | nginx (Ubuntu Cosmic): status | Confirmed | Fix Released | |
2018-11-13 15:19:03 | Thomas Ward | nginx (Ubuntu Disco): status | Confirmed | Fix Committed | |
2019-08-07 17:27:23 | Steve Beattie | nginx (Ubuntu Disco): status | Fix Committed | Fix Released | |
2019-08-07 17:27:26 | Steve Beattie | nginx (Ubuntu): status | Fix Committed | Fix Released |