{"id":"USN-4967-2","summary":"nginx vulnerability","details":"USN-4967-1 fixed a vulnerability in nginx. This update provides\nthe corresponding update for Ubuntu 14.04 ESM and 16.04 ESM.\n\nOriginal advisory details:\n\n Luis Merino, Markus Vervier, and Eric Sesterhenn discovered that nginx\n incorrectly handled responses to the DNS resolver. A remote attacker could\n use this issue to cause nginx to crash, resulting in a denial of service,\n or possibly execute arbitrary code.\n","modified":"2026-02-10T04:42:12Z","published":"2021-05-27T13:12:38Z","related":["UBUNTU-CVE-2021-23017"],"upstream":["CVE-2021-23017","UBUNTU-CVE-2021-23017"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4967-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-23017"}],"affected":[{"package":{"name":"nginx","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/nginx@1.4.6-1ubuntu3.9+esm2?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.6-1ubuntu3.9+esm2"}]}],"versions":["1.4.1-3ubuntu1","1.4.3-2ubuntu1","1.4.4-1ubuntu1","1.4.4-2ubuntu1","1.4.4-4ubuntu1","1.4.5-1ubuntu1","1.4.6-1ubuntu2","1.4.6-1ubuntu3","1.4.6-1ubuntu3.1","1.4.6-1ubuntu3.2","1.4.6-1ubuntu3.3","1.4.6-1ubuntu3.4","1.4.6-1ubuntu3.5","1.4.6-1ubuntu3.6","1.4.6-1ubuntu3.7","1.4.6-1ubuntu3.8","1.4.6-1ubuntu3.9","1.4.6-1ubuntu3.9+esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.4.6-1ubuntu3.9+esm2","binary_name":"nginx"},{"binary_version":"1.4.6-1ubuntu3.9+esm2","binary_name":"nginx-common"},{"binary_version":"1.4.6-1ubuntu3.9+esm2","binary_name":"nginx-core"},{"binary_version":"1.4.6-1ubuntu3.9+esm2","binary_name":"nginx-extras"},{"binary_version":"1.4.6-1ubuntu3.9+esm2","binary_name":"nginx-full"},{"binary_version":"1.4.6-1ubuntu3.9+esm2","binary_name":"nginx-light"},{"binary_version":"1.4.6-1ubuntu3.9+esm2","binary_name":"nginx-naxsi"},{"binary_version":"1.4.6-1ubuntu3.9+esm2","binary_name":"nginx-naxsi-ui"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4967-2.json","cves_map":{"cves":[{"id":"CVE-2021-23017","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:14.04:LTS"}}},{"package":{"name":"nginx","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/nginx@1.10.3-0ubuntu0.16.04.5+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10.3-0ubuntu0.16.04.5+esm1"}]}],"versions":["1.9.3-1ubuntu1","1.9.6-2ubuntu1","1.9.6-2ubuntu2","1.9.9-0ubuntu1","1.9.9-1ubuntu1","1.9.10-0ubuntu1","1.9.10-1ubuntu1","1.9.11-0ubuntu1","1.9.11-0ubuntu2","1.9.12-0ubuntu1","1.9.13-0ubuntu1","1.9.14-0ubuntu1","1.9.15-0ubuntu1","1.10.0-0ubuntu0.16.04.1","1.10.0-0ubuntu0.16.04.2","1.10.0-0ubuntu0.16.04.3","1.10.0-0ubuntu0.16.04.4","1.10.3-0ubuntu0.16.04.1","1.10.3-0ubuntu0.16.04.2","1.10.3-0ubuntu0.16.04.3","1.10.3-0ubuntu0.16.04.4","1.10.3-0ubuntu0.16.04.5"],"ecosystem_specific":{"binaries":[{"binary_version":"1.10.3-0ubuntu0.16.04.5+esm1","binary_name":"nginx"},{"binary_version":"1.10.3-0ubuntu0.16.04.5+esm1","binary_name":"nginx-common"},{"binary_version":"1.10.3-0ubuntu0.16.04.5+esm1","binary_name":"nginx-core"},{"binary_version":"1.10.3-0ubuntu0.16.04.5+esm1","binary_name":"nginx-extras"},{"binary_version":"1.10.3-0ubuntu0.16.04.5+esm1","binary_name":"nginx-full"},{"binary_version":"1.10.3-0ubuntu0.16.04.5+esm1","binary_name":"nginx-light"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4967-2.json","cves_map":{"cves":[{"id":"CVE-2021-23017","severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:Pro:16.04:LTS"}}}],"schema_version":"1.7.3"}