[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3203-1] nginx security update

Debian LTS Advisory DLA-3203-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Markus Koschany
November 23, 2022                             https://wiki.debian.org/LTS

Package        : nginx
Version        : 1.14.2-2+deb10u5
CVE ID         : CVE-2021-3618 CVE-2022-41741 CVE-2022-41742
Debian Bug     : 991328

It was discovered that parsing errors in the mp4 module of Nginx, a
high-performance web and reverse proxy server, could result in denial
of service, memory disclosure or potentially the execution of arbitrary
code when processing a malformed mp4 file.

This module is only enabled in the nginx-extras binary package.

In addition the following vulnerability has been fixed.


    ALPACA is an application layer protocol content confusion attack,
    exploiting TLS servers implementing different protocols but using
    compatible certificates, such as multi-domain or wildcard certificates.
    A MiTM attacker having access to victim's traffic at the TCP/IP layer can
    redirect traffic from one subdomain to another, resulting in a valid TLS
    session. This breaks the authentication of TLS and cross-protocol attacks
    may be possible where the behavior of one protocol service may compromise 

For Debian 10 buster, these problems have been fixed in version

We recommend that you upgrade your nginx packages.

For the detailed security status of nginx please refer to
its security tracker page at:

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: This is a digitally signed message part

Reply to: