UbuntuUpdates.org

Package "libnginx-mod-http-upstream-fair"

Name: libnginx-mod-http-upstream-fair

Description:

Nginx Upstream Fair Proxy Load Balancer

Latest version: 1.18.0-0ubuntu1.6
Release: focal (20.04)
Level: updates
Repository: universe
Head package: nginx
Homepage: http://nginx.net

Links


Download "libnginx-mod-http-upstream-fair"


Other versions of "libnginx-mod-http-upstream-fair" in Focal

Repository Area Version
base universe 1.17.10-0ubuntu1
security universe 1.18.0-0ubuntu1.6

Changelog

Version: 1.18.0-0ubuntu1.6 2024-09-16 16:06:56 UTC

  nginx (1.18.0-0ubuntu1.6) focal-security; urgency=medium

  * SECURITY UPDATE: DoS in ngx_http_mp4_module
    - debian/patches/CVE-2024-7347-1.patch: fixed buffer underread while
      updating stsz atom in src/http/modules/ngx_http_mp4_module.c.
    - debian/patches/CVE-2024-7347-2.patch: reject unordered chunks in stsc
      atom in src/http/modules/ngx_http_mp4_module.c.
    - CVE-2024-7347

 -- Marc Deslauriers <email address hidden> Tue, 10 Sep 2024 09:52:13 -0400

Source diff to previous version
CVE-2024-7347 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resu

Version: 1.18.0-0ubuntu1.5 2024-07-15 13:07:12 UTC

  nginx (1.18.0-0ubuntu1.5) focal; urgency=medium

  * d/rules: add -moutline-atomics for arm64 (LP: #2024019).

 -- Mitchell Dzurick <email address hidden> Wed, 20 Mar 2024 15:11:50 -0700

Source diff to previous version
2024019 Add GCC atomic support (-moutline-atomics) for arm64 on Focal

Version: 1.18.0-0ubuntu1.4 2022-11-15 08:06:25 UTC

  nginx (1.18.0-0ubuntu1.4) focal-security; urgency=medium

  * SECURITY UPDATE: memory corruption/disclosure issue
    - debian/patches/CVE-2022-41741_41742.patch: disabled duplicate atoms in
      Mp4
    - CVE-2022-41741
    - CVE-2022-41742

 -- Nishit Majithia <email address hidden> Thu, 10 Nov 2022 12:08:48 +0530

Source diff to previous version
CVE-2022-41741 NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R
CVE-2022-41742 NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R

Version: 1.18.0-0ubuntu1.3 2022-04-12 17:06:24 UTC

  nginx (1.18.0-0ubuntu1.3) focal-security; urgency=medium

  * SECURITY UPDATE: ALPACA TLS issue
    - debian/patches/CVE-2021-3618.patch: specify the number of
      errors after which the connection is closed in
      src/mail/ngx_mail.h, src/mail/ngx_mail_core_module.c and
      src/mail/ngx_mail_handler.c.
    - CVE-2021-3618
  * SECURITY UPDATE: request mutation by unsafe characters
    - Add input validation to requests in Lua module in
      debian/modules/http-lua/src/ngx_http_lua_control.c,
      debian/modules/http-lua/src/ngx_http_lua_headers_in.c,
      debian/modules/http-lua/src/ngx_http_lua_headers_out.c,
      debian/modules/http-lua/src/ngx_http_lua_uri.c,
      debian/modules/http-lua/src/ngx_http_lua_util.h and
      debian/modules/http-lua/src/ngx_http_lua_util.h.
    - CVE-2020-36309
  * SECURITY UPDATE: request smuggling in ngx.location.capture
    - Add manual crafting of Content-Length in case request is
      chunked in
      debian/modules/http-lua/src/ngx_http_lua_subrequest.c.
    - CVE-2020-11724

 -- David Fernandez Gonzalez <email address hidden> Tue, 12 Apr 2022 10:04:16 +0200

Source diff to previous version
CVE-2021-3618 ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certif
CVE-2020-36309 ngx_http_lua_module (aka lua-nginx-module) before 0.10.16 in OpenResty allows unsafe characters in an argument when using the API to mutate a URI, or
CVE-2020-11724 An issue was discovered in OpenResty before 1.15.8.4. ngx_http_lua_subrequest.c allows HTTP request smuggling, as demonstrated by the ngx.location.ca

Version: 1.18.0-0ubuntu1.2 2021-05-26 16:06:31 UTC

  nginx (1.18.0-0ubuntu1.2) focal-security; urgency=medium

  * SECURITY UPDATE: DNS Resolver issues
    - debian/patches/CVE-2021-23017-1.patch: fixed off-by-one write in
      src/core/ngx_resolver.c.
    - debian/patches/CVE-2021-23017-2.patch: fixed off-by-one read in
      src/core/ngx_resolver.c.
    - CVE-2021-23017

 -- Marc Deslauriers <email address hidden> Tue, 25 May 2021 13:10:38 -0400




About   -   Send Feedback to @ubuntu_updates