Speedtest-Tracker
Speedtest-Tracker copied to clipboard
[SECURITY] Critical Vulnerability in Nginx - upgrade to 1.20.1 or 1.21 or greater.
nginx 0.6.x < 1.20.1 1-Byte Memory Overwrite RCE Description According to its Server response header, the installed version of nginx is 0.6.18 prior to 1.20.1. It is, therefore, affected by a remote code execution vulnerability. A security issue in nginx resolver was identified, which might allow an unauthenticated remote attacker to cause 1-byte memory overwrite by using a specially crafted DNS response, resulting in worker process crash or, potentially, in arbitrary code execution.
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Solution Upgrade to nginx 1.20.1 or later. See Also http://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html http://nginx.org/download/patch.2021.resolver.txt
I tried to understand, if someone can contribute somehow so that GH action will build a new stable docker image with the latest linuxserver/docker-nginx release… But I couldn't figure out how?! So @henrywhitaker3 is the only one, who can and must do something. I tried to trigger him by my PR #893
BTW: I also checked with latest trivy:trivy image henrywhitaker3/speedtest-tracker, but it didn't find any nginx vulnerability 😞 (but some other critical and high flagged 😱 )