CVE-2021-23017

NameCVE-2021-23017
DescriptionA security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2670-1, DSA-4921-1, ELA-437-1
Debian Bugs989095

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
nginx (PTS)jessie, jessie (lts)1.6.2-5+deb8u10fixed
stretch (security)1.10.3-1+deb9u7fixed
stretch (lts), stretch1.10.3-1+deb9u8fixed
buster (security), buster, buster (lts)1.14.2-2+deb10u5fixed
bullseye (security), bullseye1.18.0-6.1+deb11u3fixed
bookworm1.22.1-9fixed
sid, trixie1.26.0-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
nginxsourcejessie1.6.2-5+deb8u8ELA-437-1
nginxsourcestretch1.10.3-1+deb9u6DLA-2670-1
nginxsourcebuster1.14.2-2+deb10u4DSA-4921-1
nginxsource(unstable)1.18.0-6.1989095

Notes

https://www.openwall.com/lists/oss-security/2021/05/25/5
Patch: http://nginx.org/download/patch.2021.resolver.txt
Fixed by: https://github.com/nginx/nginx/commit/7199ebc203f74fd9e44595474de6bdc41740c5cf (1.20.1)

Search for package or bug name: Reporting problems