How to Automate Managing Gateway Servers in K8s Environment (using OpenResty Edge)
OpenResty 1.19.3.2 Released
Johnny Wang , 02 Jun 2021 (created 02 Jun 2021)OpenResty 1.19.3.2 is a patch release addressing a security vulnerability in the NGINX resolver that may allow an attacker who is able to forge UDP packets from the specified DNS server to cause a 1-byte memory overwrite, resulting in a worker process crash or other unspecified impact. (CVE-2021-23017)
NGINX cores from 0.6.18 to 1.20.0 (included) are affected by this issue.
If you are using resolver
directive with any previous OpenResty release, upgrade
to 1.19.3.2.
The (portable) source code distribution, the Win32/Win64 binary distributions, and the pre-built binary Linux packages for Ubuntu, Debian, Fedora, CentOS, RHEL, OpenSUSE, Amazon Linux are provided on this Download page.
This is the second OpenResty release based on the nginx 1.19.3 core.
Version highlights
- Upgraded openssl to 1.1.1k for Win32/Win64.
- Applied the patch for security advisory to NGINX cores >= 0.6.18 and <= 1.20.0 (CVE-2021-23017).
Full Change logs
Complete change logs since the last (formal) release, 1.17.8.2, can be browsed in the page Change Log for 1.19.3.x.
Testing
We have run extensive testing on our Amazon EC2 test cluster and ensured that all the components (including the Nginx core) play well together. The latest test report can always be found here:
We also always run our OpenResty Edge commercial software based on the latest open source version of OpenResty in our own global CDN network (dubbed "mini CDN") powering our openresty.org and openresty.com websites. See https://openresty.com/ for more details.
Community Support
See the Community Page.
Commercial Support
Commercial technical support and real-time noninvasive online monitoring and profiling solution is provided through the official OpenResty XRay product.
Feedback
Feedback on this release is more than welcome. Feel free to create new GitHub issues or send emails to one of our mailing lists.