USN-5371-2: nginx vulnerability
28 April 2022
nginx could be made to redirect network traffic.
Releases
Packages
- nginx - small, powerful, scalable web/proxy server
Details
USN-5371-1 fixed several vulnerabilities in nginx.
This update provides the fix for CVE-2021-3618 for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue was fixed for Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11724)
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to disclose sensitive
information. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-36309)
It was discovered that nginx mishandled the use of
compatible certificates among multiple encryption protocols.
If a remote attacker were able to intercept the communication,
this issue could be used to redirect traffic between subdomains.
(CVE-2021-3618)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5371-1: libnginx-mod-http-subs-filter, libnginx-mod-http-image-filter, nginx-light, libnginx-mod-http-echo, libnginx-mod-nchan, nginx-doc, libnginx-mod-stream-geoip2, libnginx-mod-http-ndk, libnginx-mod-http-headers-more-filter, nginx-common, libnginx-mod-rtmp, libnginx-mod-http-geoip, libnginx-mod-http-lua, libnginx-mod-stream-geoip, nginx-extras, libnginx-mod-http-uploadprogress, libnginx-mod-http-upstream-fair, libnginx-mod-http-auth-pam, libnginx-mod-http-fancyindex, libnginx-mod-http-dav-ext, libnginx-mod-http-cache-purge, libnginx-mod-http-xslt-filter, libnginx-mod-mail, libnginx-mod-stream, nginx-core, libnginx-mod-http-perl, nginx-full, nginx, libnginx-mod-http-geoip2
- USN-6379-1: vsftpd