|
|
Subscribe / Log in / New account

Gentoo alert 202409-32 (nginx)

From:  glsamaker@gentoo.org
To:  gentoo-announce@lists.gentoo.org
Subject:  [gentoo-announce] [ GLSA 202409-32 ] nginx: Multiple Vulnerabilities
Date:  Sat, 28 Sep 2024 08:27:55 -0000
Message-ID:  <172751207525.7.9250149954599048187@3f85d36892cf>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202409-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: nginx: Multiple Vulnerabilities Date: September 28, 2024 Bugs: #924619, #937938 ID: 202409-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in nginx, the worst of which could result in denial of service. Background ========== nginx is a robust, small, and high performance HTTP and reverse proxy server. Affected packages ================= Package Vulnerable Unaffected ----------------- ------------ ------------ www-servers/nginx < 1.26.2-r2 >= 1.26.2-r2 Description =========== Multiple vulnerabilities have been discovered in nginx. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All nginx users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/nginx-1.26.2-r2" References ========== [ 1 ] CVE-2024-7347 https://nvd.nist.gov/vuln/detail/CVE-2024-7347 [ 2 ] CVE-2024-24989 https://nvd.nist.gov/vuln/detail/CVE-2024-24989 [ 3 ] CVE-2024-24990 https://nvd.nist.gov/vuln/detail/CVE-2024-24990 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202409-32 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmb3vgsACgkQFMQkOaVy +9mf6xAAo9e+/AoLZjU5Ru5AR+3va8nouNhQNpecZpLlzODgL6EAWZcO4kj9ECqM tBb6w0DpNud6s6/UgxS9ioSFlzdbYjPnZ0stfuUmJiE2MYfr6qS/XHczHjWDoQCl iPs/CCkNAat/wcgcVKfaChycvV0K5cSNnHCVK4vrfO95pMBKSKI+fOCg8N7xxKyG 9Qcw7GVouQvlI7FuV/zYMETGAMyz/5o1nq05HpA1TJRinwNNIhdUmVmbzZP5UmrQ CsB/EXD2yJJLSuqRnH6gNAmKFKf1umVUrCj8GMRSaRp4B/bhsu/1dkDihkEpd2Ug YjvCJdhT0RNLXSOkkZsX6ADVk2MaMOgmRr5RuVWGM4MqoYJzeEeIiLsm1kshxAG0 uyOFeLTTRJYz8jFSUGk+z6FppW4YjQlxdQrFTCozAv6/mY/Qqi/fZf/ev/ArR8Xp RSiFo+GYBcBXYNQE1TWbaOyogiqKT8Mrn4TCjS8T7Gra1OR0fVOofa3n6mDSo12r xNQvBMMhrmXBfCDo5ZQyP0IelbpgIhD3YFPkMq/yW3qGHVzcLkg9MBAy94LhofnG 0N3yeZG/OXI4IcrXryqbpSFGiQ2OCSwfCI0pR1/EvpksYkJ9oLuDVxWdMkX64+HI mTj/KIZ0xbCxbpAmaV7DYXSYdg7Fr7trwTqGUeumMkQwcHHjMtw= =KYV+ -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds