USN-4235-2: nginx vulnerability
15 January 2020
nginx could be made to expose sensitive information over the network.
Releases
Packages
- nginx - small, powerful, scalable web/proxy server
Details
USN-4235-1 fixed a vulnerability in nginx. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
Bert JW Regeer and Francisco Oca Gonzalez discovered that nginx incorrectly
handled certain error_page configurations. A remote attacker could possibly
use this issue to perform HTTP request smuggling attacks and access
resources contrary to expectations.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
-
nginx-extras
-
1.4.6-1ubuntu3.9+esm1
-
nginx-core
-
1.4.6-1ubuntu3.9+esm1
-
nginx-common
-
1.4.6-1ubuntu3.9+esm1
-
nginx-full
-
1.4.6-1ubuntu3.9+esm1
-
nginx-light
-
1.4.6-1ubuntu3.9+esm1
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4235-1: libnginx-mod-http-echo, nginx, nginx-common, libnginx-mod-http-fancyindex, libnginx-mod-nchan, libnginx-mod-stream, libnginx-mod-http-uploadprogress, libnginx-mod-http-cache-purge, libnginx-mod-http-lua, libnginx-mod-mail, libnginx-mod-http-perl, libnginx-mod-http-xslt-filter, nginx-extras, nginx-light, nginx-doc, libnginx-mod-http-subs-filter, libnginx-mod-http-ndk, libnginx-mod-http-image-filter, libnginx-mod-http-dav-ext, libnginx-mod-http-auth-pam, nginx-core, libnginx-mod-rtmp, nginx-full, libnginx-mod-http-geoip2, libnginx-mod-http-geoip, libnginx-mod-http-headers-more-filter, libnginx-mod-http-upstream-fair