<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">nginx-1.21.3-1.4 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11092</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">nginx-1.21.3-1.4 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the nginx-1.21.3-1.4 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11092</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:11092</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7529/</URL>
      <Description>SUSE CVE CVE-2017-7529 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16843/</URL>
      <Description>SUSE CVE CVE-2018-16843 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-16845/</URL>
      <Description>SUSE CVE CVE-2018-16845 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-20372/</URL>
      <Description>SUSE CVE CVE-2019-20372 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9511/</URL>
      <Description>SUSE CVE CVE-2019-9511 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-9516/</URL>
      <Description>SUSE CVE CVE-2019-9516 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-23017/</URL>
      <Description>SUSE CVE CVE-2021-23017 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nginx-1.21.3-1.4">
      <FullProductName ProductID="nginx-1.21.3-1.4">nginx-1.21.3-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nginx-source-1.21.3-1.4">
      <FullProductName ProductID="nginx-source-1.21.3-1.4">nginx-source-1.21.3-1.4</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="vim-plugin-nginx-1.21.3-1.4">
      <FullProductName ProductID="vim-plugin-nginx-1.21.3-1.4">vim-plugin-nginx-1.21.3-1.4</FullProductName>
    </Branch>
    <Relationship ProductReference="nginx-1.21.3-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nginx-1.21.3-1.4">nginx-1.21.3-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="nginx-source-1.21.3-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:nginx-source-1.21.3-1.4">nginx-source-1.21.3-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="vim-plugin-nginx-1.21.3-1.4" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4">vim-plugin-nginx-1.21.3-1.4 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.</Note>
    </Notes>
    <CVE>CVE-2017-7529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nginx-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:nginx-source-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7529.html</URL>
        <Description>CVE-2017-7529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1048265</URL>
        <Description>SUSE Bug 1048265</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive memory consumption. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.</Note>
    </Notes>
    <CVE>CVE-2018-16843</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nginx-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:nginx-source-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16843.html</URL>
        <Description>CVE-2018-16843</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115022</URL>
        <Description>SUSE Bug 1115022</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115025</URL>
        <Description>SUSE Bug 1115025</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">nginx before versions 1.15.6, 1.14.1 has a vulnerability in the ngx_http_mp4_module, which might allow an attacker to cause infinite loop in a worker process, cause a worker process crash, or might result in worker process memory disclosure by using a specially crafted mp4 file. The issue only affects nginx if it is built with the ngx_http_mp4_module (the module is not built by default) and the .mp4. directive is used in the configuration file. Further, the attack is only possible if an attacker is able to trigger processing of a specially crafted mp4 file with the ngx_http_mp4_module.</Note>
    </Notes>
    <CVE>CVE-2018-16845</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nginx-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:nginx-source-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16845.html</URL>
        <Description>CVE-2018-16845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1115015</URL>
        <Description>SUSE Bug 1115015</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NGINX before 1.17.7, with certain error_page configurations, allows HTTP request smuggling, as demonstrated by the ability of an attacker to read unauthorized web pages in environments where NGINX is being fronted by a load balancer.</Note>
    </Notes>
    <CVE>CVE-2019-20372</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nginx-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:nginx-source-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-20372.html</URL>
        <Description>CVE-2019-20372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1160682</URL>
        <Description>SUSE Bug 1160682</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service. The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.</Note>
    </Notes>
    <CVE>CVE-2019-9511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nginx-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:nginx-source-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9511.html</URL>
        <Description>CVE-2019-9511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1145579</URL>
        <Description>SUSE Bug 1145579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146091</URL>
        <Description>SUSE Bug 1146091</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146182</URL>
        <Description>SUSE Bug 1146182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193427</URL>
        <Description>SUSE Bug 1193427</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1202787</URL>
        <Description>SUSE Bug 1202787</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory.</Note>
    </Notes>
    <CVE>CVE-2019-9516</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nginx-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:nginx-source-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-9516.html</URL>
        <Description>CVE-2019-9516</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1145582</URL>
        <Description>SUSE Bug 1145582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1146090</URL>
        <Description>SUSE Bug 1146090</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1193427</URL>
        <Description>SUSE Bug 1193427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.</Note>
    </Notes>
    <CVE>CVE-2021-23017</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:nginx-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:nginx-source-1.21.3-1.4</ProductID>
        <ProductID>openSUSE Tumbleweed:vim-plugin-nginx-1.21.3-1.4</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-23017.html</URL>
        <Description>CVE-2021-23017</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1186126</URL>
        <Description>SUSE Bug 1186126</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
