Package "nginx-dev"
| Name: |
nginx-dev
|
Description: |
nginx web/proxy server - development headers
|
| Latest version: |
1.24.0-2ubuntu7.7 |
| Release: |
noble (24.04) |
| Level: |
updates |
| Repository: |
universe |
| Head package: |
nginx |
| Homepage: |
https://nginx.org |
Links
Download "nginx-dev"
Other versions of "nginx-dev" in Noble
Changelog
|
nginx (1.24.0-2ubuntu7.7) noble-security; urgency=medium
* SECURITY UPDATE: process crash in ngx_mail_auth_http_module
- debian/patches/CVE-2026-27651.patch: fixed clearing s->passwd in auth
http requests in src/mail/ngx_mail_auth_http_module.c.
- CVE-2026-27651
* SECURITY UPDATE: buffer overflow in ngx_http_dav_module module
- debian/patches/CVE-2026-27654.patch: add destination length
validation for COPY and MOVE in
src/http/modules/ngx_http_dav_module.c.
- CVE-2026-27654
* SECURITY UPDATE: buffer overflow in ngx_http_mp4_module module
- debian/patches/CVE-2026-27784.patch: fixed possible integer overflow
on 32-bit platforms in src/http/modules/ngx_http_mp4_module.c.
- CVE-2026-27784
* SECURITY UPDATE: header injection in ngx_mail_smtp_module module
- debian/patches/CVE-2026-28753.patch: add host validation in
src/mail/ngx_mail_smtp_handler.c.
- CVE-2026-28753
* SECURITY UPDATE: cert validation issue in ngx_stream_ssl_module module
- debian/patches/CVE-2026-28755.patch: fixed client certificate
validation with OCSP in src/stream/ngx_stream_ssl_module.c.
- CVE-2026-28755
* SECURITY UPDATE: buffer overflow in ngx_http_mp4_module module
- debian/patches/CVE-2026-32647.patch: avoid zero size buffers in
output in src/http/modules/ngx_http_mp4_module.c.
- CVE-2026-32647
-- Marc Deslauriers <email address hidden> Thu, 23 Apr 2026 08:25:28 -0400
|
| Source diff to previous version |
| CVE-2026-27651 |
When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate |
| CVE-2026-27654 |
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to |
| CVE-2026-27784 |
The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or o |
| CVE-2026-28753 |
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS respon |
| CVE-2026-28755 |
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_stream_ssl_module module due to the improper handling of revoked certificates when c |
| CVE-2026-32647 |
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read |
|
|
nginx (1.24.0-2ubuntu7.6) noble-security; urgency=medium
* SECURITY UPDATE: Proxy server response plain text injection
- debian/patches/CVE-2026-1642.patch: detect premature plain text
response from SSL backend in src/http/ngx_http_upstream.c.
- CVE-2026-1642
-- Marc Deslauriers <email address hidden> Mon, 09 Feb 2026 09:03:49 -0500
|
| Source diff to previous version |
| CVE-2026-1642 |
A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a ma |
|
|
nginx (1.24.0-2ubuntu7.5) noble-security; urgency=medium
* SECURITY UPDATE: data leak in ngx_mail_smtp_module
- debian/patches/CVE-2025-53859.patch: properly check lengths in
src/mail/ngx_mail_handler.c.
- CVE-2025-53859
-- Marc Deslauriers <email address hidden> Fri, 22 Aug 2025 08:45:15 -0400
|
| Source diff to previous version |
| CVE-2025-53859 |
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMT |
|
|
nginx (1.24.0-2ubuntu7.4) noble; urgency=medium
[ Thomas Ward ]
* d/control: Resolve dependency loop between nginx and nginx-common.
* d/nginx-common.nginx.service: Add ConditionFileIsExecutable to
SystemD service file, prevents starting of service if nginx is
not installed (which can happen if nginx-common is installed
independently from `nginx` itself (LP: #2081308)
-- Matthew Ruffell <email address hidden> Tue, 27 May 2025 15:28:18 +1200
|
| Source diff to previous version |
| 2081308 |
Resolve circular dependency loop between nginx and nginx-common |
|
|
nginx (1.24.0-2ubuntu7.3) noble-security; urgency=medium
* SECURITY UPDATE: Session resumption
- debian/patches/CVE-2025-23419.patch: added restriction for TLSv1.3
cross-SNI session resumption in files src/http/ngx_http_request.c.
- CVE-2025-23419
-- Leonidas Da Silva Barbosa <email address hidden> Mon, 31 Mar 2025 15:38:37 -0300
|
| CVE-2025-23419 |
When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate |
|
About
-
Send Feedback to @ubuntu_updates