UbuntuUpdates.org

Package "nginx-core"

Name: nginx-core

Description:

nginx web/proxy server (standard version)

Latest version: 1.18.0-6ubuntu14.5
Release: jammy (22.04)
Level: security
Repository: main
Head package: nginx
Homepage: https://nginx.net

Links


Download "nginx-core"


Other versions of "nginx-core" in Jammy

Repository Area Version
base main 1.18.0-6ubuntu14
updates main 1.18.0-6ubuntu14.5

Changelog

Version: 1.18.0-6ubuntu14.5 2024-09-16 15:07:07 UTC

  nginx (1.18.0-6ubuntu14.5) jammy-security; urgency=medium

  * SECURITY UPDATE: DoS in ngx_http_mp4_module
    - debian/patches/CVE-2024-7347-1.patch: fixed buffer underread while
      updating stsz atom in src/http/modules/ngx_http_mp4_module.c.
    - debian/patches/CVE-2024-7347-2.patch: reject unordered chunks in stsc
      atom in src/http/modules/ngx_http_mp4_module.c.
    - CVE-2024-7347

 -- Marc Deslauriers <email address hidden> Tue, 10 Sep 2024 09:51:15 -0400

Source diff to previous version
CVE-2024-7347 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resu

Version: 1.18.0-6ubuntu14.3 2022-11-15 07:06:55 UTC

  nginx (1.18.0-6ubuntu14.3) jammy-security; urgency=medium

  * SECURITY UPDATE: memory corruption/disclosure issue
    - debian/patches/CVE-2022-41741_41742.patch: disabled duplicate atoms in
      Mp4
    - CVE-2022-41741
    - CVE-2022-41742

 -- Nishit Majithia <email address hidden> Thu, 10 Nov 2022 12:09:42 +0530

Source diff to previous version
CVE-2022-41741 NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R
CVE-2022-41742 NGINX Open Source before versions 1.23.2 and 1.22.1, NGINX Open Source Subscription before versions R2 P1 and R1 P1, and NGINX Plus before versions R

Version: 1.18.0-6ubuntu14.1 2022-04-28 09:06:18 UTC

  nginx (1.18.0-6ubuntu14.1) jammy-security; urgency=medium

  * SECURITY UPDATE: ALPACA TLS issue
    - debian/patches/CVE-2021-3618.patch: specify the number of
      errors after which the connection is closed in
      src/mail/ngx_mail.h, src/mail/ngx_mail_core_module.c and
      src/mail/ngx_mail_handler.c.
    - CVE-2021-3618

 -- David Fernandez Gonzalez <email address hidden> Wed, 27 Apr 2022 12:56:57 +0200

CVE-2021-3618 ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certif



About   -   Send Feedback to @ubuntu_updates