123 Star 0 Fork 45

src-openEuler/nginx

CVE-2022-41741

已完成
CVE和安全问题 拥有者
创建于  
2022-10-20 07:32

一、漏洞信息
漏洞编号:CVE-2022-41741
漏洞归属组件:nginx
漏洞归属的版本:1.16.1,1.18.0,1.19.1,1.21.5,1.23.2
CVSS V3.0分值:
BaseScore:7.8 High
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
漏洞简述:
NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R27 P1 and R26 P1 have a vulnerability in the module ngx_http_mp4_module that might allow a local attacker to corrupt NGINX worker memory, resulting in its termination or potential other impact using a specially crafted audio or video file. The issue affects only NGINX products that are built with the ngx_http_mp4_module, when the mp4 directive is used in the configuration file. Further, the attack is possible only if an attacker can trigger processing of a specially crafted audio or video file with the module ngx_http_mp4_module.
漏洞公开时间:2022-10-20 06:15:00
漏洞创建时间:2022-10-20 07:32:26
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2022-41741

更多参考(点击展开)
参考来源 参考链接 来源链接
nvd https://support.f5.com/csp/article/K81926432
nvd https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPRVYA4FS34VWB4FEFYNAD7Z2LFCJVEI/
nvd https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FD6M3PVVKO35WLAA7GLDBS6TEQ26SM64/
nvd https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WBORRVG7VVXYOAIAD64ZHES2U2VIUKFQ/
nvd https://www.debian.org/security/2022/dsa-5281
nvd https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html
redhat https://access.redhat.com/security/cve/CVE-2022-41741
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41741 https://bugzilla.suse.com/show_bug.cgi?id=1204526
suse_bugzilla https://www.cve.org/CVERecord?id=CVE-2022-41741 https://bugzilla.suse.com/show_bug.cgi?id=1204526
suse_bugzilla http://www.cvedetails.com/cve/CVE-2022-41741/ https://bugzilla.suse.com/show_bug.cgi?id=1204526
suse_bugzilla https://support.f5.com/csp/article/K81926432 https://bugzilla.suse.com/show_bug.cgi?id=1204526
redhat_bugzilla https://nginx.org/en/security_advisories.html https://bugzilla.redhat.com/show_bug.cgi?id=2141495
ubuntu https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41741 https://ubuntu.com/security/CVE-2022-41741
ubuntu https://support.f5.com/csp/article/K81926432 https://ubuntu.com/security/CVE-2022-41741
ubuntu https://mailman.nginx.org/archives/list/nginx-announce@nginx.org/message/RBRRON6PYBJJM2XIAPQBFBVLR4Q6IHRA/ https://ubuntu.com/security/CVE-2022-41741
ubuntu https://github.com/nginx/nginx/commit/0d23105373e6d8a720b9826079c077b9b4be919d https://ubuntu.com/security/CVE-2022-41741
ubuntu https://ubuntu.com/security/notices/USN-5722-1 https://ubuntu.com/security/CVE-2022-41741
ubuntu https://nvd.nist.gov/vuln/detail/CVE-2022-41741 https://ubuntu.com/security/CVE-2022-41741
ubuntu https://launchpad.net/bugs/cve/CVE-2022-41741 https://ubuntu.com/security/CVE-2022-41741
ubuntu https://security-tracker.debian.org/tracker/CVE-2022-41741 https://ubuntu.com/security/CVE-2022-41741
debian https://security-tracker.debian.org/tracker/CVE-2022-41741
cve_search https://support.f5.com/csp/article/K81926432
cve_search https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPRVYA4FS34VWB4FEFYNAD7Z2LFCJVEI/
cve_search https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FD6M3PVVKO35WLAA7GLDBS6TEQ26SM64/
cve_search https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WBORRVG7VVXYOAIAD64ZHES2U2VIUKFQ/
cve_search https://www.debian.org/security/2022/dsa-5281
mageia http://advisories.mageia.org/MGASA-2022-0398.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2257.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2264.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2284.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2285.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2286.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2287.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2288.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2289.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2304.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2343.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2344.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2345.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2816.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2817.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-2819.html https://alas.aws.amazon.com/ALAS-2022-1639.html
amazon_linux https://alas.aws.amazon.com/cve/html/CVE-2022-3037.html https://alas.aws.amazon.com/ALAS-2022-1639.html
nvd https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPRVYA4FS34VWB4FEFYNAD7Z2LFCJVEI/
nvd https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FD6M3PVVKO35WLAA7GLDBS6TEQ26SM64/
nvd https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WBORRVG7VVXYOAIAD64ZHES2U2VIUKFQ/
nvd https://www.debian.org/security/2022/dsa-5281
nvd https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html
suse_bugzilla http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-41741
suse_bugzilla https://www.cve.org/CVERecord?id=CVE-2022-41741
suse_bugzilla http://www.cvedetails.com/cve/CVE-2022-41741/
suse_bugzilla https://support.f5.com/csp/article/K81926432
debian https://security-tracker.debian.org/tracker/CVE-2022-41741
nvd https://support.f5.com/csp/article/K81926432

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
openBrain开源漏洞感知系统
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://github.com/nginx/nginx/commit/0d23105373e6d8a720b9826079c077b9b4be919d ubuntu

二、漏洞分析结构反馈
影响性分析说明:
NGINX在模块ngx_http_mp4_module中存在漏洞,可能允许本地攻击者破坏NGINX worker内存,使用特制的音频或视频文件导致其终止或潜在的其他影响。当nginx构建的时候启用ngx_http_mp4_module,并在配置文件中使用 mp4指令时,攻击者可以利用此模块的漏洞用特制音频或视频文件进行攻击。
openEuler评分:
7.8
Vector:CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.openEuler-20.03-LTS-SP1(1.21.5):受影响
2.openEuler-20.03-LTS-SP3(1.21.5):受影响
3.openEuler-22.03-LTS(1.21.5):受影响

修复是否涉及abi变化(是/否):
1.openEuler-20.03-LTS-SP1(1.21.5):否
2.openEuler-20.03-LTS-SP3(1.21.5):否
3.openEuler-22.03-LTS(1.21.5):否

三、漏洞修复
安全公告链接:https://www.openeuler.org/zh/security/safety-bulletin/detail/?id=openEuler-SA-2022-2023

评论 (10)

登录 后才可以发表评论

状态
负责人
项目
里程碑
分支
开始日期   -   截止日期
-
置顶选项
优先级
预计工期 (小时)
参与者(1)
5329419 openeuler ci bot 1632792936
1
https://gitee.com/src-openeuler/nginx.git
git@gitee.com:src-openeuler/nginx.git
src-openeuler
nginx
nginx

搜索帮助