rhsa-2016_1425
Vulnerability from csaf_redhat
Published
2016-07-14 05:50
Modified
2024-11-05 19:22
Summary
Red Hat Security Advisory: rh-nginx18-nginx security update

Notes

Topic
An update for rh-nginx18-nginx is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Nginx is a web and proxy server with a focus on high concurrency, performance, and low memory usage. The following packages have been upgraded to a newer upstream version: rh-nginx18-nginx (1.8.1). Security Fix(es): * A NULL pointer dereference flaw was found in the nginx code responsible for saving client request body to a temporary file. A remote attacker could send a specially crafted request that would cause nginx worker process to crash. (CVE-2016-4450) * It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration. (CVE-2016-0742) * A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration. (CVE-2016-0746) * It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration. (CVE-2016-0747)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for rh-nginx18-nginx is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Nginx is a web and proxy server with a focus on high concurrency, performance, and low memory usage.\n\nThe following packages have been upgraded to a newer upstream version: rh-nginx18-nginx (1.8.1).\n\nSecurity Fix(es):\n\n* A NULL pointer dereference flaw was found in the nginx code responsible for saving client request body to a temporary file. A remote attacker could send a specially crafted request that would cause nginx worker process to crash. (CVE-2016-4450)\n\n* It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration. (CVE-2016-0742)\n\n* A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration. (CVE-2016-0746)\n\n* It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration. (CVE-2016-0747)",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2016:1425",
        "url": "https://access.redhat.com/errata/RHSA-2016:1425"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "1302587",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302587"
      },
      {
        "category": "external",
        "summary": "1302588",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588"
      },
      {
        "category": "external",
        "summary": "1302589",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302589"
      },
      {
        "category": "external",
        "summary": "1341462",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341462"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1425.json"
      }
    ],
    "title": "Red Hat Security Advisory: rh-nginx18-nginx security update",
    "tracking": {
      "current_release_date": "2024-11-05T19:22:56+00:00",
      "generator": {
        "date": "2024-11-05T19:22:56+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.1.1"
        }
      },
      "id": "RHSA-2016:1425",
      "initial_release_date": "2016-07-14T05:50:00+00:00",
      "revision_history": [
        {
          "date": "2016-07-14T05:50:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2016-07-14T05:50:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-05T19:22:56+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)",
                  "product_id": "7Server-RHSCL-2.2-7.2.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)",
                  "product_id": "7Server-RHSCL-2.2-7.1.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-RHSCL-2.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-RHSCL-2.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server-RHSCL-2.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation-RHSCL-2.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)",
                  "product_id": "6Server-RHSCL-2.2-6.6.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
                "product": {
                  "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
                  "product_id": "6Server-RHSCL-2.2-6.7.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Software Collections"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
                "product": {
                  "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
                  "product_id": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-nginx18-nginx-debuginfo@1.8.1-1.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
                "product": {
                  "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
                  "product_id": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el7?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
                "product": {
                  "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
                  "product_id": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-nginx18-nginx-debuginfo@1.8.1-1.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
                "product": {
                  "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
                  "product_id": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el6?arch=x86_64\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src",
                "product": {
                  "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src",
                  "product_id": "rh-nginx18-nginx-1:1.8.1-1.el7.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el7?arch=src\u0026epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src",
                "product": {
                  "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src",
                  "product_id": "rh-nginx18-nginx-1:1.8.1-1.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/rh-nginx18-nginx@1.8.1-1.el6?arch=src\u0026epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)",
          "product_id": "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src",
        "relates_to_product_reference": "6Server-RHSCL-2.2-6.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)",
          "product_id": "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.2-6.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)",
          "product_id": "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.2-6.6.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src",
        "relates_to_product_reference": "6Server-RHSCL-2.2-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.2-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)",
          "product_id": "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.2-6.7.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src",
        "relates_to_product_reference": "6Server-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
        "relates_to_product_reference": "6Server-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.src",
        "relates_to_product_reference": "6Workstation-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
        "relates_to_product_reference": "6Workstation-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)",
          "product_id": "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src",
        "relates_to_product_reference": "7Server-RHSCL-2.2-7.1.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)",
          "product_id": "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.2-7.1.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)",
          "product_id": "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.2-7.1.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src",
        "relates_to_product_reference": "7Server-RHSCL-2.2-7.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.2-7.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.2)",
          "product_id": "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.2-7.2.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src",
        "relates_to_product_reference": "7Server-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
        "relates_to_product_reference": "7Server-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.src",
        "relates_to_product_reference": "7Workstation-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
        },
        "product_reference": "rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
        "relates_to_product_reference": "7Workstation-RHSCL-2.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2016-0742",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2016-01-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1302587"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that nginx could perform an out of bound read and dereference an invalid pointer when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash if nginx enabled the resolver in its configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nginx: invalid pointer dereference in resolver",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-0742"
        },
        {
          "category": "external",
          "summary": "RHBZ#1302587",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302587"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0742",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-0742"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0742",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0742"
        },
        {
          "category": "external",
          "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html",
          "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html"
        }
      ],
      "release_date": "2016-01-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2016-07-14T05:50:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.",
          "product_ids": [
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2016:1425"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nginx: invalid pointer dereference in resolver"
    },
    {
      "cve": "CVE-2016-0746",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2016-01-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1302588"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free flaw was found in the way nginx resolved certain CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to crash or, possibly, execute arbitrary code if nginx enabled the resolver in its configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nginx: use-after-free during CNAME response processing in resolver",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-0746"
        },
        {
          "category": "external",
          "summary": "RHBZ#1302588",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302588"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0746",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-0746"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0746",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0746"
        },
        {
          "category": "external",
          "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html",
          "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html"
        }
      ],
      "release_date": "2016-01-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2016-07-14T05:50:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.",
          "product_ids": [
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2016:1425"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.1,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          "products": [
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nginx: use-after-free during CNAME response processing in resolver"
    },
    {
      "cve": "CVE-2016-0747",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "discovery_date": "2016-01-26T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1302589"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "It was discovered that nginx did not limit recursion when resolving CNAME DNS records. An attacker able to manipulate DNS responses received by nginx could use this flaw to cause a worker process to use an excessive amount of resources if nginx enabled the resolver in its configuration.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nginx: Insufficient limits of CNAME resolution in resolver",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-0747"
        },
        {
          "category": "external",
          "summary": "RHBZ#1302589",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1302589"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0747",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-0747"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0747",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0747"
        },
        {
          "category": "external",
          "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html",
          "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000169.html"
        }
      ],
      "release_date": "2016-01-26T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2016-07-14T05:50:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.",
          "product_ids": [
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2016:1425"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nginx: Insufficient limits of CNAME resolution in resolver"
    },
    {
      "cve": "CVE-2016-4450",
      "cwe": {
        "id": "CWE-476",
        "name": "NULL Pointer Dereference"
      },
      "discovery_date": "2016-05-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "1341462"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A NULL pointer dereference flaw was found in the nginx code responsible for saving client request body to a temporary file. A remote attacker could send a specially crafted request that would cause nginx worker process to crash.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "nginx: NULL pointer dereference while writing client request body",
          "title": "Vulnerability summary"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
          "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
          "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2016-4450"
        },
        {
          "category": "external",
          "summary": "RHBZ#1341462",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1341462"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4450",
          "url": "https://www.cve.org/CVERecord?id=CVE-2016-4450"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4450",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4450"
        },
        {
          "category": "external",
          "summary": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html",
          "url": "http://mailman.nginx.org/pipermail/nginx-announce/2016/000179.html"
        }
      ],
      "release_date": "2016-05-31T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2016-07-14T05:50:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe rh-nginx18-nginx service must be restarted for this update to take effect.",
          "product_ids": [
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2016:1425"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          "products": [
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.6.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2-6.7.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.src",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el6.x86_64",
            "6Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el6.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.1.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2-7.2.Z:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Server-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.src",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-1:1.8.1-1.el7.x86_64",
            "7Workstation-RHSCL-2.2:rh-nginx18-nginx-debuginfo-1:1.8.1-1.el7.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "nginx: NULL pointer dereference while writing client request body"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.