Amazon Linux 1 Security Advisory: ALAS-2021-1507
Advisory Release Date: 2021-06-01 17:58 Pacific
Advisory Updated Date: 2021-06-02 00:04 Pacific
A flaw was found in nginx. An off-by-one error while processing DNS responses allows a network attacker to write a dot character out of bounds in a heap allocated buffer which can allow overwriting the least significant byte of next heap chunk metadata likely leading to a remote code execution in certain circumstances. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2021-23017)
Affected Packages:
nginx
Issue Correction:
Run yum update nginx to update your system.
i686:
nginx-mod-stream-1.18.0-1.43.amzn1.i686
nginx-mod-mail-1.18.0-1.43.amzn1.i686
nginx-mod-http-image-filter-1.18.0-1.43.amzn1.i686
nginx-mod-http-perl-1.18.0-1.43.amzn1.i686
nginx-debuginfo-1.18.0-1.43.amzn1.i686
nginx-mod-http-xslt-filter-1.18.0-1.43.amzn1.i686
nginx-1.18.0-1.43.amzn1.i686
nginx-all-modules-1.18.0-1.43.amzn1.i686
nginx-mod-http-geoip-1.18.0-1.43.amzn1.i686
src:
nginx-1.18.0-1.43.amzn1.src
x86_64:
nginx-1.18.0-1.43.amzn1.x86_64
nginx-mod-http-image-filter-1.18.0-1.43.amzn1.x86_64
nginx-debuginfo-1.18.0-1.43.amzn1.x86_64
nginx-mod-http-perl-1.18.0-1.43.amzn1.x86_64
nginx-mod-http-xslt-filter-1.18.0-1.43.amzn1.x86_64
nginx-mod-stream-1.18.0-1.43.amzn1.x86_64
nginx-mod-mail-1.18.0-1.43.amzn1.x86_64
nginx-mod-http-geoip-1.18.0-1.43.amzn1.x86_64
nginx-all-modules-1.18.0-1.43.amzn1.x86_64