UbuntuUpdates.org

Package "nginx"

Name: nginx

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • GeoIP HTTP module for Nginx
  • Perl module for Nginx
  • GeoIP Stream module for Nginx
  • nginx web/proxy server - development headers

Latest version: 1.24.0-2ubuntu7.7
Release: noble (24.04)
Level: updates
Repository: universe

Links



Other versions of "nginx" in Noble

Repository Area Version
base universe 1.24.0-2ubuntu7
base main 1.24.0-2ubuntu7
security main 1.24.0-2ubuntu7.7
security universe 1.24.0-2ubuntu7.7
updates main 1.24.0-2ubuntu7.7
PPA: Nginx from nginx.org 1.30.0-1~noble

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 1.24.0-2ubuntu7.7 2026-04-27 14:11:10 UTC

  nginx (1.24.0-2ubuntu7.7) noble-security; urgency=medium

  * SECURITY UPDATE: process crash in ngx_mail_auth_http_module
    - debian/patches/CVE-2026-27651.patch: fixed clearing s->passwd in auth
      http requests in src/mail/ngx_mail_auth_http_module.c.
    - CVE-2026-27651
  * SECURITY UPDATE: buffer overflow in ngx_http_dav_module module
    - debian/patches/CVE-2026-27654.patch: add destination length
      validation for COPY and MOVE in
      src/http/modules/ngx_http_dav_module.c.
    - CVE-2026-27654
  * SECURITY UPDATE: buffer overflow in ngx_http_mp4_module module
    - debian/patches/CVE-2026-27784.patch: fixed possible integer overflow
      on 32-bit platforms in src/http/modules/ngx_http_mp4_module.c.
    - CVE-2026-27784
  * SECURITY UPDATE: header injection in ngx_mail_smtp_module module
    - debian/patches/CVE-2026-28753.patch: add host validation in
      src/mail/ngx_mail_smtp_handler.c.
    - CVE-2026-28753
  * SECURITY UPDATE: cert validation issue in ngx_stream_ssl_module module
    - debian/patches/CVE-2026-28755.patch: fixed client certificate
      validation with OCSP in src/stream/ngx_stream_ssl_module.c.
    - CVE-2026-28755
  * SECURITY UPDATE: buffer overflow in ngx_http_mp4_module module
    - debian/patches/CVE-2026-32647.patch: avoid zero size buffers in
      output in src/http/modules/ngx_http_mp4_module.c.
    - CVE-2026-32647

 -- Marc Deslauriers <email address hidden> Thu, 23 Apr 2026 08:25:28 -0400

Source diff to previous version
CVE-2026-27651 When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate
CVE-2026-27654 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to
CVE-2026-27784 The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or o
CVE-2026-28753 NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS respon
CVE-2026-28755 NGINX Plus and NGINX Open Source have a vulnerability in the ngx_stream_ssl_module module due to the improper handling of revoked certificates when c
CVE-2026-32647 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read

Version: 1.24.0-2ubuntu7.6 2026-02-13 01:08:41 UTC

  nginx (1.24.0-2ubuntu7.6) noble-security; urgency=medium

  * SECURITY UPDATE: Proxy server response plain text injection
    - debian/patches/CVE-2026-1642.patch: detect premature plain text
      response from SSL backend in src/http/ngx_http_upstream.c.
    - CVE-2026-1642

 -- Marc Deslauriers <email address hidden> Mon, 09 Feb 2026 09:03:49 -0500

Source diff to previous version
CVE-2026-1642 A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a ma

Version: 1.24.0-2ubuntu7.5 2025-08-25 19:07:23 UTC

  nginx (1.24.0-2ubuntu7.5) noble-security; urgency=medium

  * SECURITY UPDATE: data leak in ngx_mail_smtp_module
    - debian/patches/CVE-2025-53859.patch: properly check lengths in
      src/mail/ngx_mail_handler.c.
    - CVE-2025-53859

 -- Marc Deslauriers <email address hidden> Fri, 22 Aug 2025 08:45:15 -0400

Source diff to previous version
CVE-2025-53859 NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMT

Version: 1.24.0-2ubuntu7.4 2025-06-25 16:07:00 UTC

  nginx (1.24.0-2ubuntu7.4) noble; urgency=medium

  [ Thomas Ward ]
  * d/control: Resolve dependency loop between nginx and nginx-common.
  * d/nginx-common.nginx.service: Add ConditionFileIsExecutable to
    SystemD service file, prevents starting of service if nginx is
    not installed (which can happen if nginx-common is installed
    independently from `nginx` itself (LP: #2081308)

 -- Matthew Ruffell <email address hidden> Tue, 27 May 2025 15:28:18 +1200

Source diff to previous version
2081308 Resolve circular dependency loop between nginx and nginx-common

Version: 1.24.0-2ubuntu7.3 2025-04-01 16:07:01 UTC

  nginx (1.24.0-2ubuntu7.3) noble-security; urgency=medium

  * SECURITY UPDATE: Session resumption
    - debian/patches/CVE-2025-23419.patch: added restriction for TLSv1.3
      cross-SNI session resumption in files src/http/ngx_http_request.c.
    - CVE-2025-23419

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 31 Mar 2025 15:38:37 -0300

CVE-2025-23419 When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate



About   -   Send Feedback to @ubuntu_updates