[OOD-users] Critical NGINX CVE-2021-23017 patch available

Ohrstrom, Jeffrey G. johrstrom at osc.edu
Fri Oct 8 12:11:45 EDT 2021


Hi, we've patched ondemand-nginx for CVE-2021-23017. This CVE does not affect OnDemand because we do not use the resolver directive, but we've patched it just for good measure.

To update perform the following operation:

# EL7
yum update ondemand-nginx

# EL8
dnf update ondemand-nginx

In order to ensure all PUNs are using the patched NGINX it's recommended to force kill all PUNs:

/opt/ood/nginx_stage/sbin/nginx_stage nginx_clean --force

For more information see
To update perform the following operation:

# EL7
yum update ondemand-nginx

# EL8
dnf update ondemand-nginx

In order to ensure all PUNs are using the patched NGINX it's recommended to force kill all PUNs:

/opt/ood/nginx_stage/sbin/nginx_stage nginx_clean --force

For more information see:
https://nvd.nist.gov/vuln/detail/CVE-2021-23017 or
https://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html


- Jeff Ohrstrom

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.osu.edu/pipermail/ood-users/attachments/20211008/3b6101ef/attachment.html>


More information about the OOD-users mailing list