USN-5371-3: nginx vulnerability
- Canonical Ubuntu 16.04
USN-5371-1 and USN-5371-2 fixed several vulnerabilities in nginx. This update provides the corresponding update for CVE-2020-11724 for Ubuntu 16.04 ESM. Original advisory details: It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to perform an HTTP Request Smuggling attack. This issue was fixed for Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-11724) It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to disclose sensitive information. This issue only affects Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-36309) It was discovered that nginx mishandled the use of compatible certificates among multiple encryption protocols. If a remote attacker were able to intercept the communication, this issue could be used to redirect traffic between subdomains. (CVE-2021-3618) Update Instructions: Run `sudo pro fix USN-5371-3` to fix the vulnerability. The problem can be corrected by updating your system to the following package versions: nginx-extras - 1.10.3-0ubuntu0.16.04.5+esm4 nginx-core - 1.10.3-0ubuntu0.16.04.5+esm4 nginx-common - 1.10.3-0ubuntu0.16.04.5+esm4 nginx-full - 1.10.3-0ubuntu0.16.04.5+esm4 nginx - 1.10.3-0ubuntu0.16.04.5+esm4 nginx-light - 1.10.3-0ubuntu0.16.04.5+esm4 nginx-doc - 1.10.3-0ubuntu0.16.04.5+esm4 Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro
CVEs contained in this USN include: CVE-2020-11724
Affected VMware Products and Versions
Severity is medium unless otherwise noted.
- 2.7.x versions prior to 2.7.25
- 2.8.x versions prior to 2.8.16
- 2.9.x versions prior to 2.9.12
- 2.10.x versions prior to 2.10.3
Users of affected products are strongly encouraged to follow the mitigation below. On the Tanzu Network product page for each release, check the Depends On section and/or Release Notes for this information. Releases that have fixed this issue include:
2022-12-08: Initial vulnerability report published.