[OOD-users] Critical NGINX CVE-2021-23017 patch available
Ohrstrom, Jeffrey G.
johrstrom at osc.edu
Fri Oct 8 12:11:45 EDT 2021
Hi, we've patched ondemand-nginx for CVE-2021-23017. This CVE does not affect OnDemand because we do not use the resolver directive, but we've patched it just for good measure.
To update perform the following operation:
# EL7
yum update ondemand-nginx
# EL8
dnf update ondemand-nginx
In order to ensure all PUNs are using the patched NGINX it's recommended to force kill all PUNs:
/opt/ood/nginx_stage/sbin/nginx_stage nginx_clean --force
For more information see
To update perform the following operation:
# EL7
yum update ondemand-nginx
# EL8
dnf update ondemand-nginx
In order to ensure all PUNs are using the patched NGINX it's recommended to force kill all PUNs:
/opt/ood/nginx_stage/sbin/nginx_stage nginx_clean --force
For more information see:
https://nvd.nist.gov/vuln/detail/CVE-2021-23017 or
https://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html
- Jeff Ohrstrom
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.osu.edu/pipermail/ood-users/attachments/20211008/3b6101ef/attachment.html>
More information about the OOD-users
mailing list