Your submission was sent successfully! Close

USN-5371-2: nginx vulnerability

28 April 2022

nginx could be made to redirect network traffic.

Releases

Packages

  • nginx - small, powerful, scalable web/proxy server

Details

USN-5371-1 fixed several vulnerabilities in nginx.
This update provides the fix for CVE-2021-3618 for Ubuntu 22.04 LTS.

Original advisory details:

It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11724)

It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to disclose sensitive
information. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-36309)

It was discovered that nginx mishandled the use of
compatible certificates among multiple encryption protocols.
If a remote attacker were able to intercept the communication,
this issue could be used to redirect traffic between subdomains.
(CVE-2021-3618)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 22.04

In general, a standard system update will make all the necessary changes.

References

Related notices

  • USN-5371-1: libnginx-mod-http-geoip2, libnginx-mod-http-dav-ext, libnginx-mod-http-xslt-filter, libnginx-mod-stream, libnginx-mod-rtmp, libnginx-mod-http-headers-more-filter, libnginx-mod-nchan, libnginx-mod-http-image-filter, libnginx-mod-http-echo, libnginx-mod-stream-geoip, nginx, libnginx-mod-http-upstream-fair, nginx-full, libnginx-mod-stream-geoip2, libnginx-mod-http-lua, nginx-doc, libnginx-mod-http-fancyindex, libnginx-mod-mail, libnginx-mod-http-geoip, libnginx-mod-http-ndk, libnginx-mod-http-subs-filter, libnginx-mod-http-perl, nginx-core, libnginx-mod-http-auth-pam, nginx-common, nginx-extras, libnginx-mod-http-cache-purge, nginx-light, libnginx-mod-http-uploadprogress