[USN-4967-2] nginx vulnerability
Severity
Medium
Affected Packages
16
CVEs
1
nginx could be made to crash or run programs if it received specially crafted network traffic.
USN-4967-1 fixed a vulnerability in nginx. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.
Original advisory details:
Luis Merino, Markus Vervier, and Eric Sesterhenn discovered that nginx
incorrectly handled responses to the DNS resolver. A remote attacker could
use this issue to cause nginx to crash, resulting in a denial of service,
or possibly execute arbitrary code.
- ID
- USN-4967-2
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-4967-2
- Published
-
2021-05-27T13:12:38
(3 years ago) - Modified
-
2021-05-27T13:12:38
(3 years ago) - Other Advisories
-
- ALAS-2021-1507
- ALPINE:CVE-2021-23017
- ALSA-2021:2259
- ALSA-2021:2290
- ALSA-2022:0323
- ASA-202106-36
- ASA-202106-48
- DSA-4921-1
- ELSA-2021-2259
- ELSA-2021-2290
- ELSA-2022-0323
- FEDORA-2021-393d698493
- FEDORA-2021-b37cffac0d
- FREEBSD:0882F019-BD60-11EB-9BDD-8C164567CA3C
- GLSA-202105-38
- MS:CVE-2021-23017
- NGINX:CVE-2021-23017
- openSUSE-SU-2021:0835-1
- openSUSE-SU-2021:1815-1
- RHSA-2021:2259
- RHSA-2021:2290
- RHSA-2022:0323
- RLSA-2021:2259
- RLSA-2021:2290
- RLSA-2022:0323
- SUSE-SU-2021:1792-1
- SUSE-SU-2021:1814-1
- SUSE-SU-2021:1815-1
- SUSE-SU-2021:1839-1
- USN-4967-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/nginx?distro=xenial | ubuntu | nginx | < 1.10.3-0ubuntu0.16.04.5+esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nginx?distro=trusty | ubuntu | nginx | < 1.4.6-1ubuntu3.9+esm2 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-naxsi?distro=trusty | ubuntu | nginx-naxsi | < 1.4.6-1ubuntu3.9+esm2 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-naxsi-ui?distro=trusty | ubuntu | nginx-naxsi-ui | < 1.4.6-1ubuntu3.9+esm2 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-light?distro=xenial | ubuntu | nginx-light | < 1.10.3-0ubuntu0.16.04.5+esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-light?distro=trusty | ubuntu | nginx-light | < 1.4.6-1ubuntu3.9+esm2 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-full?distro=xenial | ubuntu | nginx-full | < 1.10.3-0ubuntu0.16.04.5+esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-full?distro=trusty | ubuntu | nginx-full | < 1.4.6-1ubuntu3.9+esm2 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-extras?distro=xenial | ubuntu | nginx-extras | < 1.10.3-0ubuntu0.16.04.5+esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-extras?distro=trusty | ubuntu | nginx-extras | < 1.4.6-1ubuntu3.9+esm2 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-doc?distro=xenial | ubuntu | nginx-doc | < 1.10.3-0ubuntu0.16.04.5+esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-doc?distro=trusty | ubuntu | nginx-doc | < 1.4.6-1ubuntu3.9+esm2 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-core?distro=xenial | ubuntu | nginx-core | < 1.10.3-0ubuntu0.16.04.5+esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-core?distro=trusty | ubuntu | nginx-core | < 1.4.6-1ubuntu3.9+esm2 | trusty | ||
Affected | pkg:deb/ubuntu/nginx-common?distro=xenial | ubuntu | nginx-common | < 1.10.3-0ubuntu0.16.04.5+esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nginx-common?distro=trusty | ubuntu | nginx-common | < 1.4.6-1ubuntu3.9+esm2 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |