liuxiran commented on a change in pull request #362:
URL: https://github.com/apache/apisix-website/pull/362#discussion_r647931421



##########
File path: 
website/blog/2021-06-07-Apache-APISIX-not-affected-by-NGINX-CVE-2021-23017.md
##########
@@ -0,0 +1,51 @@
+---
+title: "Apache APISIX not affected by NGINX CVE-2021-23017"
+author: Ruofei Zhao
+authorURL: "https://github.com/Serendipity96";
+authorImageURL: "https://avatars.githubusercontent.com/u/23514812?v=4";
+---
+> [@Serendipity96](https://github.com/Serendipity96), Apache APISIX 
contributor from [Shenzhen Zhiliu Technology Co.](https://www.apiseven.com/)
+>
+
+<!--truncate-->
+
+
+On May 26, NGINX issued a security announcement that fixed a DNS resolver 
vulnerability (CVE -2021-23017) in the NGINX resolver.
+
+ngx_resolver_copy() handles DNS responses with errors. When the "resolver" 
instruction is used in the NGINX configuration file, and might allow an 
attacker who is able to forge UDP packets from the DNS server to cause 1-byte 
memory overwrite, resulting in worker process crash or potential other impact.
+
+Vulnerability level: high risk, CVSS score 8.1
+
+Affected versions: NGINX 0.6.18 - 1.20.0
+
+If you want to know more details, you can visit the following 
links:https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-23017
+
+
+

Review comment:
       ```suggestion
   ```




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to