liuxiran commented on a change in pull request #362: URL: https://github.com/apache/apisix-website/pull/362#discussion_r647232443
########## File path: website/blog/2021-06-07-Apache-APISIX-not-affected-by-NGINX-CVE-2021-23017.md ########## @@ -0,0 +1,51 @@ +--- +title: "Apache APISIX not affected by NGINX CVE-2021-23017" +author: Ruofei Zhao +authorURL: "https://github.com/Serendipity96" +authorImageURL: "https://avatars.githubusercontent.com/u/23514812?v=4" +--- +> [@Serendipity96](https://github.com/Serendipity96), Apache APISIX contributor from [Shenzhen Zhiliu Technology Co.](https://www.apiseven.com/) +> + +<!--truncate--> + + +On May 26, NGINX issued a security announcement that fixed a DNS resolver vulnerability (CVE -2021-23017) in the NGINX resolver. + +ngx_resolver_copy() handles DNS responses with errors. When the "resolver" instruction is used in the NGINX configuration file, and might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact. + +Vulnerability level: high risk, CVSS score 8.1 + +Affected versions: NGINX 0.6.18 - 1.20.0 + +If you want to know more details, you can visit the following links:https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-23017 Review comment: ```suggestion If you want to know more details, you can visit the following link:https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-23017 ``` ########## File path: website/blog/2021-06-07-Apache-APISIX-not-affected-by-NGINX-CVE-2021-23017.md ########## @@ -0,0 +1,51 @@ +--- +title: "Apache APISIX not affected by NGINX CVE-2021-23017" +author: Ruofei Zhao +authorURL: "https://github.com/Serendipity96" +authorImageURL: "https://avatars.githubusercontent.com/u/23514812?v=4" +--- +> [@Serendipity96](https://github.com/Serendipity96), Apache APISIX contributor from [Shenzhen Zhiliu Technology Co.](https://www.apiseven.com/) +> + +<!--truncate--> + + +On May 26, NGINX issued a security announcement that fixed a DNS resolver vulnerability (CVE -2021-23017) in the NGINX resolver. + +ngx_resolver_copy() handles DNS responses with errors. When the "resolver" instruction is used in the NGINX configuration file, and might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact. Review comment: ```suggestion `ngx_resolver_copy()` handles DNS responses with errors. When the "resolver" instruction is used in the NGINX configuration file, it might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or other potential impacts. ``` ########## File path: website/blog/2021-06-07-Apache-APISIX-not-affected-by-NGINX-CVE-2021-23017.md ########## @@ -0,0 +1,51 @@ +--- +title: "Apache APISIX not affected by NGINX CVE-2021-23017" +author: Ruofei Zhao +authorURL: "https://github.com/Serendipity96" +authorImageURL: "https://avatars.githubusercontent.com/u/23514812?v=4" +--- +> [@Serendipity96](https://github.com/Serendipity96), Apache APISIX contributor from [Shenzhen Zhiliu Technology Co.](https://www.apiseven.com/) +> + +<!--truncate--> + + +On May 26, NGINX issued a security announcement that fixed a DNS resolver vulnerability (CVE -2021-23017) in the NGINX resolver. + +ngx_resolver_copy() handles DNS responses with errors. When the "resolver" instruction is used in the NGINX configuration file, and might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact. + +Vulnerability level: high risk, CVSS score 8.1 + +Affected versions: NGINX 0.6.18 - 1.20.0 + +If you want to know more details, you can visit the following links:https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-23017 + + + +Two days before this security vulnerability was disclosed, on May 24, [Apache APISIX released version 2.6](https://mp.weixin.qq.com/s?__biz=MzI1MDU3NjQ5OA==&mid=2247485444&idx=1&sn=5b0bab964490dc2d7a7b25262d9396b2&chksm=e9816319def6ea0fbdafa69426718184e042d6d1cde1d20e410e6ee414756960273f9d625bd2&scene=21#wechat_redirect). This version contains many excellent features, such as support for using Java to write plugins. Apache APISIX 2.6 is not affected by this vulnerability. + +Apache APISIX only uses some features of NGINX, other core functions, such as: + +- Route matching +- IP matching +- DNS resolve +- Dynamic Upstream +- Dynamic Certificate + +They are all implemented by Apache APISIX instead of the built-in mechanism of NGINX, so they will not be affected by this security vulnerability. Review comment: ```suggestion are all implemented by Apache APISIX instead of the built-in mechanism of NGINX, so it will not be affected by this security vulnerability. ``` -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: [email protected]
