USN-4967-2: nginx vulnerability
27 May 2021
nginx could be made to crash or run programs if it received specially crafted network traffic.
Releases
Packages
- nginx - small, powerful, scalable web/proxy server
Details
USN-4967-1 fixed a vulnerability in nginx. This update provides
the corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.
Original advisory details:
Luis Merino, Markus Vervier, and Eric Sesterhenn discovered that nginx
incorrectly handled responses to the DNS resolver. A remote attacker could
use this issue to cause nginx to crash, resulting in a denial of service,
or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
nginx
-
1.10.3-0ubuntu0.16.04.5+esm1
Available with Ubuntu Pro
-
nginx-common
-
1.10.3-0ubuntu0.16.04.5+esm1
Available with Ubuntu Pro
-
nginx-core
-
1.10.3-0ubuntu0.16.04.5+esm1
Available with Ubuntu Pro
-
nginx-extras
-
1.10.3-0ubuntu0.16.04.5+esm1
Available with Ubuntu Pro
-
nginx-full
-
1.10.3-0ubuntu0.16.04.5+esm1
Available with Ubuntu Pro
-
nginx-light
-
1.10.3-0ubuntu0.16.04.5+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
nginx
-
1.4.6-1ubuntu3.9+esm2
Available with Ubuntu Pro
-
nginx-common
-
1.4.6-1ubuntu3.9+esm2
Available with Ubuntu Pro
-
nginx-core
-
1.4.6-1ubuntu3.9+esm2
Available with Ubuntu Pro
-
nginx-extras
-
1.4.6-1ubuntu3.9+esm2
Available with Ubuntu Pro
-
nginx-full
-
1.4.6-1ubuntu3.9+esm2
Available with Ubuntu Pro
-
nginx-light
-
1.4.6-1ubuntu3.9+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.