{"schema_version":"1.7.2","id":"OESA-2024-2065","modified":"2024-08-30T11:08:58Z","published":"2024-08-30T11:08:58Z","upstream":["CVE-2024-7347"],"summary":"nginx security update","details":"NGINX is a free, open-source, high-performance HTTP server and reverse proxy,  as well as an IMAP/POP3 proxy server.\r\n\r\nSecurity Fix(es):\r\n\r\nNGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.(CVE-2024-7347)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"nginx","purl":"pkg:rpm/openEuler/nginx\u0026distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.21.5-7.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["nginx-1.21.5-7.oe2203sp4.aarch64.rpm","nginx-debuginfo-1.21.5-7.oe2203sp4.aarch64.rpm","nginx-debugsource-1.21.5-7.oe2203sp4.aarch64.rpm","nginx-mod-devel-1.21.5-7.oe2203sp4.aarch64.rpm","nginx-mod-http-image-filter-1.21.5-7.oe2203sp4.aarch64.rpm","nginx-mod-http-perl-1.21.5-7.oe2203sp4.aarch64.rpm","nginx-mod-http-xslt-filter-1.21.5-7.oe2203sp4.aarch64.rpm","nginx-mod-mail-1.21.5-7.oe2203sp4.aarch64.rpm","nginx-mod-stream-1.21.5-7.oe2203sp4.aarch64.rpm"],"noarch":["nginx-all-modules-1.21.5-7.oe2203sp4.noarch.rpm","nginx-filesystem-1.21.5-7.oe2203sp4.noarch.rpm","nginx-help-1.21.5-7.oe2203sp4.noarch.rpm"],"src":["nginx-1.21.5-7.oe2203sp4.src.rpm"],"x86_64":["nginx-1.21.5-7.oe2203sp4.x86_64.rpm","nginx-debuginfo-1.21.5-7.oe2203sp4.x86_64.rpm","nginx-debugsource-1.21.5-7.oe2203sp4.x86_64.rpm","nginx-mod-devel-1.21.5-7.oe2203sp4.x86_64.rpm","nginx-mod-http-image-filter-1.21.5-7.oe2203sp4.x86_64.rpm","nginx-mod-http-perl-1.21.5-7.oe2203sp4.x86_64.rpm","nginx-mod-http-xslt-filter-1.21.5-7.oe2203sp4.x86_64.rpm","nginx-mod-mail-1.21.5-7.oe2203sp4.x86_64.rpm","nginx-mod-stream-1.21.5-7.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2065"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-7347"}],"database_specific":{"severity":"Medium"}}