Release date:
2022-04-11 16:48:57 UTC
Description:
* SECURITY UPDATE: Vulnerability against application layer
protocol content confusion attack
- debian/patches/CVE-2021-3618.patch: Drop the connection after
reaching the specified number of invalid protocol commmands
- CVE-2021-3618
Updated packages:
-
nginx_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_all.deb
sha:b6333ed576982ccde50c0813818c62df32268cdb
-
nginx-common_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_all.deb
sha:90b7077ad46936bed824640d6e6f5ea4675e6fcb
-
nginx-core_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_amd64.deb
sha:3a0368d1c266e59ab6259b7594d7a0501de8c391
-
nginx-doc_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_all.deb
sha:c47132626b3518585ac460d0eb3c9c77aa97963f
-
nginx-extras_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_amd64.deb
sha:1ee6bb1386dbee1c186cf9fe7eb554a2453af9dc
-
nginx-full_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_amd64.deb
sha:69f1b00763447a80fc313192e368c4dd07c21c19
-
nginx-light_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_amd64.deb
sha:93c175b308f56277724b2d1ebd9c377b8b1e9554
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.