[CLSA-2022:1649695737] Fix CVE(s): CVE-2021-3618
Type:
security
Severity:
moderate
Release date:
2022-04-11 16:48:57 UTC
Description:
* SECURITY UPDATE: Vulnerability against application layer protocol content confusion attack - debian/patches/CVE-2021-3618.patch: Drop the connection after reaching the specified number of invalid protocol commmands - CVE-2021-3618
Updated packages:
  • nginx_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_all.deb
    sha:b6333ed576982ccde50c0813818c62df32268cdb
  • nginx-common_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_all.deb
    sha:90b7077ad46936bed824640d6e6f5ea4675e6fcb
  • nginx-core_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_amd64.deb
    sha:3a0368d1c266e59ab6259b7594d7a0501de8c391
  • nginx-doc_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_all.deb
    sha:c47132626b3518585ac460d0eb3c9c77aa97963f
  • nginx-extras_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_amd64.deb
    sha:1ee6bb1386dbee1c186cf9fe7eb554a2453af9dc
  • nginx-full_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_amd64.deb
    sha:69f1b00763447a80fc313192e368c4dd07c21c19
  • nginx-light_1.10.3-0ubuntu0.16.04.8+tuxcare.els1_amd64.deb
    sha:93c175b308f56277724b2d1ebd9c377b8b1e9554
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.