[ALAS-2021-1507] Amazon Linux AMI 2014.03 - ALAS-2021-1507: important priority package update for nginx
Severity
Important
Affected Packages
18
CVEs
1
Package updates are available for Amazon Linux AMI that fix the following vulnerabilities:
CVE-2021-23017:
A flaw was found in nginx. An off-by-one error while processing DNS responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
1963121: CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
- ID
- ALAS-2021-1507
- Severity
- important
- URL
- https://alas.aws.amazon.com/ALAS-2021-1507.html
- Published
-
2021-06-01T17:58:00
(3 years ago) - Modified
-
2021-06-02T00:04:00
(3 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALPINE:CVE-2021-23017
- ALSA-2021:2259
- ALSA-2021:2290
- ALSA-2022:0323
- ASA-202106-36
- ASA-202106-48
- DSA-4921-1
- ELSA-2021-2259
- ELSA-2021-2290
- ELSA-2022-0323
- FEDORA-2021-393d698493
- FEDORA-2021-b37cffac0d
- FREEBSD:0882F019-BD60-11EB-9BDD-8C164567CA3C
- GLSA-202105-38
- MS:CVE-2021-23017
- NGINX:CVE-2021-23017
- openSUSE-SU-2021:0835-1
- openSUSE-SU-2021:1815-1
- RHSA-2021:2259
- RHSA-2021:2290
- RHSA-2022:0323
- RLSA-2021:2259
- RLSA-2021:2290
- RLSA-2022:0323
- SUSE-SU-2021:1792-1
- SUSE-SU-2021:1814-1
- SUSE-SU-2021:1815-1
- SUSE-SU-2021:1839-1
- USN-4967-1
- USN-4967-2
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-23017 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/nginx?arch=x86_64&distro=amazonlinux-1 | amazonlinux | nginx | < 1.18.0-1.43.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/nginx?arch=i686&distro=amazonlinux-1 | amazonlinux | nginx | < 1.18.0-1.43.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-stream?arch=x86_64&distro=amazonlinux-1 | amazonlinux | nginx-mod-stream | < 1.18.0-1.43.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-stream?arch=i686&distro=amazonlinux-1 | amazonlinux | nginx-mod-stream | < 1.18.0-1.43.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-mail?arch=x86_64&distro=amazonlinux-1 | amazonlinux | nginx-mod-mail | < 1.18.0-1.43.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-mail?arch=i686&distro=amazonlinux-1 | amazonlinux | nginx-mod-mail | < 1.18.0-1.43.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-http-xslt-filter?arch=x86_64&distro=amazonlinux-1 | amazonlinux | nginx-mod-http-xslt-filter | < 1.18.0-1.43.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-http-xslt-filter?arch=i686&distro=amazonlinux-1 | amazonlinux | nginx-mod-http-xslt-filter | < 1.18.0-1.43.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-http-perl?arch=x86_64&distro=amazonlinux-1 | amazonlinux | nginx-mod-http-perl | < 1.18.0-1.43.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-http-perl?arch=i686&distro=amazonlinux-1 | amazonlinux | nginx-mod-http-perl | < 1.18.0-1.43.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-http-image-filter?arch=x86_64&distro=amazonlinux-1 | amazonlinux | nginx-mod-http-image-filter | < 1.18.0-1.43.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-http-image-filter?arch=i686&distro=amazonlinux-1 | amazonlinux | nginx-mod-http-image-filter | < 1.18.0-1.43.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-http-geoip?arch=x86_64&distro=amazonlinux-1 | amazonlinux | nginx-mod-http-geoip | < 1.18.0-1.43.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/nginx-mod-http-geoip?arch=i686&distro=amazonlinux-1 | amazonlinux | nginx-mod-http-geoip | < 1.18.0-1.43.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/nginx-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | nginx-debuginfo | < 1.18.0-1.43.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/nginx-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | nginx-debuginfo | < 1.18.0-1.43.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/nginx-all-modules?arch=x86_64&distro=amazonlinux-1 | amazonlinux | nginx-all-modules | < 1.18.0-1.43.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/nginx-all-modules?arch=i686&distro=amazonlinux-1 | amazonlinux | nginx-all-modules | < 1.18.0-1.43.amzn1 | amazonlinux-1 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |