Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in nginx (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in nginx (Aktualisierung)
ID: USN-4967-2
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 ESM, Ubuntu 16.04 ESM
Datum: Do, 27. Mai 2021, 22:56
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23017
Applikationen: nginx
Update von: Ausführen beliebiger Kommandos in nginx

Originalnachricht


--===============1653734618343974900==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="dDRMvlgZJXvWKvBx"
Content-Disposition: inline


--dDRMvlgZJXvWKvBx
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-4967-2
May 27, 2021

nginx vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

nginx could be made to crash or run programs if it received specially
crafted network traffic.

Software Description:
- nginx: small, powerful, scalable web/proxy server

Details:

USN-4967-1 fixed a vulnerability in nginx. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.

Original advisory details:

Luis Merino, Markus Vervier, and Eric Sesterhenn discovered that nginx
incorrectly handled responses to the DNS resolver. A remote attacker could
use this issue to cause nginx to crash, resulting in a denial of service,
or possibly execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
nginx 1.10.3-0ubuntu0.16.04.5+esm1
nginx-common 1.10.3-0ubuntu0.16.04.5+esm1
nginx-core 1.10.3-0ubuntu0.16.04.5+esm1
nginx-extras 1.10.3-0ubuntu0.16.04.5+esm1
nginx-full 1.10.3-0ubuntu0.16.04.5+esm1
nginx-light 1.10.3-0ubuntu0.16.04.5+esm1

Ubuntu 14.04 ESM:
nginx 1.4.6-1ubuntu3.9+esm2
nginx-common 1.4.6-1ubuntu3.9+esm2
nginx-core 1.4.6-1ubuntu3.9+esm2
nginx-extras 1.4.6-1ubuntu3.9+esm2
nginx-full 1.4.6-1ubuntu3.9+esm2
nginx-light 1.4.6-1ubuntu3.9+esm2

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-4967-2
https://ubuntu.com/security/notices/USN-4967-1
CVE-2021-23017

--dDRMvlgZJXvWKvBx
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=9sHP
-----END PGP SIGNATURE-----

--dDRMvlgZJXvWKvBx--


--===============1653734618343974900==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung