A security issue in nginx resolver was identified, which might allow an
attacker who is able to forge UDP packets from the DNS server to cause
1-byte memory overwrite, resulting in worker process crash or potential
other impact.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | nginx | < 1.14.0-0ubuntu1.9 | UNKNOWN |
ubuntu | 20.04 | noarch | nginx | < 1.18.0-0ubuntu1.2 | UNKNOWN |
ubuntu | 20.10 | noarch | nginx | < 1.18.0-6ubuntu2.2 | UNKNOWN |
ubuntu | 21.04 | noarch | nginx | < 1.18.0-6ubuntu8.2 | UNKNOWN |
ubuntu | 21.10 | noarch | nginx | < 1.18.0-6ubuntu9 | UNKNOWN |
ubuntu | 22.04 | noarch | nginx | < 1.18.0-6ubuntu9 | UNKNOWN |
ubuntu | 14.04 | noarch | nginx | < 1.4.6-1ubuntu3.9+esm2 | UNKNOWN |
ubuntu | 16.04 | noarch | nginx | < 1.10.3-0ubuntu0.16.04.5+esm1 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2021-23017
nvd.nist.gov/vuln/detail/CVE-2021-23017
security-tracker.debian.org/tracker/CVE-2021-23017
ubuntu.com/security/notices/USN-4967-1
ubuntu.com/security/notices/USN-4967-2
www.cve.org/CVERecord?id=CVE-2021-23017
www.x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/