drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in nginx (Aktualisierung)
Name: |
Ausführen beliebiger Kommandos in nginx (Aktualisierung) |
|
ID: |
USN-4967-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 14.04 ESM, Ubuntu 16.04 ESM |
|
Datum: |
Do, 27. Mai 2021, 22:56 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017 |
|
Applikationen: |
nginx |
|
Update von: |
Ausführen beliebiger Kommandos in nginx |
|
Originalnachricht |
--===============1653734618343974900== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="dDRMvlgZJXvWKvBx" Content-Disposition: inline
--dDRMvlgZJXvWKvBx Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
========================================================================== Ubuntu Security Notice USN-4967-2 May 27, 2021
nginx vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM - Ubuntu 14.04 ESM
Summary:
nginx could be made to crash or run programs if it received specially crafted network traffic.
Software Description: - nginx: small, powerful, scalable web/proxy server
Details:
USN-4967-1 fixed a vulnerability in nginx. This update provides the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.
Original advisory details:
Luis Merino, Markus Vervier, and Eric Sesterhenn discovered that nginx incorrectly handled responses to the DNS resolver. A remote attacker could use this issue to cause nginx to crash, resulting in a denial of service, or possibly execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 ESM: nginx 1.10.3-0ubuntu0.16.04.5+esm1 nginx-common 1.10.3-0ubuntu0.16.04.5+esm1 nginx-core 1.10.3-0ubuntu0.16.04.5+esm1 nginx-extras 1.10.3-0ubuntu0.16.04.5+esm1 nginx-full 1.10.3-0ubuntu0.16.04.5+esm1 nginx-light 1.10.3-0ubuntu0.16.04.5+esm1
Ubuntu 14.04 ESM: nginx 1.4.6-1ubuntu3.9+esm2 nginx-common 1.4.6-1ubuntu3.9+esm2 nginx-core 1.4.6-1ubuntu3.9+esm2 nginx-extras 1.4.6-1ubuntu3.9+esm2 nginx-full 1.4.6-1ubuntu3.9+esm2 nginx-light 1.4.6-1ubuntu3.9+esm2
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-4967-2 https://ubuntu.com/security/notices/USN-4967-1 CVE-2021-23017
--dDRMvlgZJXvWKvBx Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQIzBAABCgAdFiEEf+ebRFcoyOoAQoOeRbznW4QLH2kFAmCvpN4ACgkQRbznW4QL H2klSxAAl2VWrUgtmKWTr0yGXR9ZzabA4DU9cHpQFmY5nZthcAjx6sbwaIEAtWqX 6ID1oK7LZrUHdpqx7npcE2BqVXgW618cTfNU9nd4GoYgNQuX9JWJVw25/EOmBi1X 2UzCextWBqbxURr84D1I05BqkveNfg+fdArbbvChoHl8qU08aBjYHERLtBZgAnw1 KOgLDQXBnTYgqI/06nurVIQt6g+TSkaPlxN8/uRfv15j3u6uhbeX092U42JKT2m0 hdRkgepi/Q7B4lDcLJMmdH/OT+sbkKfpQQRNk0k2boFGAgCPYW2mozDlXixDeK6X tF0px1CNMOi0XwWJwu87CspuHNYARcg9fyI6RozwbkLKZ+cKAqNKD/y9rF+6ogID ssMLqVSCo2o5cGWellKCFCqQOtME7PiScW1KgucIf2JKf8b3C6vJRFmWrGl3s2J1 DBYUZpZ7FEAHqrEk49ZetMkLcfAb9mhKff3PzjjChbA0Gz8jzF8TOERGM14JcJSD pSD/VaSTo80nBpyi5GRFpKXX6IDsQwTQGrL3f6xoFbxtQ8elKP7yDvboX+cjao1r XAtYBqG/VROaWUFKQB3aILE0jCkOmd5PDI0hBoj09WkaPdS5uSjTRqsbUg59ECTU 7J6U2MP/gj2SF0ZWHfUcMqv5jgX3i5nLhdStI82GJod3jkSTl+s= =9sHP -----END PGP SIGNATURE-----
--dDRMvlgZJXvWKvBx--
--===============1653734618343974900== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
|
|
|
|