[SECURITY] [DLA 4228-1] nginx security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4228-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Sylvain Beucler
June 24, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : nginx
Version : 1.18.0-6.1+deb11u5
CVE ID : CVE-2020-36309 CVE-2024-33452
Debian Bug : 986787
Two vulnerabilities were discovered in Nginx, a high-performance web
and reverse proxy server, more precisely in ngx_http_lua_module, which
embeds the Lua scripting language into Nginx. This could lead to
request smuggling or contribute to cache poisoning and authentication
bypass.
ngx_http_lua_module is provided by the optional libnginx-mod-http-lua
binary package.
CVE-2020-36309
ngx_http_lua_module allows unsafe characters in an argument when
using the API to mutate a URI, or a request or response header.
CVE-2024-33452
lua-nginx-module allows a remote attacker to conduct HTTP request
smuggling via a crafted HEAD request.
For Debian 11 bullseye, these problems have been fixed in version
1.18.0-6.1+deb11u5.
We recommend that you upgrade your nginx packages.
For the detailed security status of nginx please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nginx
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEE1vEOfV7HXWKqBieIDTl9HeUlXjAFAmha3A4ACgkQDTl9HeUl
XjACMQ//WrPjg9WWvLAVbZVGq6JQYaHbyEWLGEgONOETkkTmRtnyjP9ZTEqjiB4y
LCbBPgjOslg3DKf4zx2/ubsIYllW1ZfW7IAplYZlUL/QViHvU0nmkUiORIqN5RTO
GG/nGJ8KjylY5v+GXBD00djK6CnCugVnnE/AR9/A8OjE23h2mDgPo4WecH5h6fAX
ef5iqa51PYmsjRZdRjuEEc+cSJJexMDhYWHM5qFSW38DpnSKWQuauVp8mUQoDuNR
p2mKC1qSozxncN7mpueE9j4Y5OXflW09TTKXKDaxLHGVjhvciVDzKL5YIZVrdHZo
z49eLxkv72Vj3ZY6EMVXU+pZlO+VbXqUvhmE2N/FXLgHN1f70S0w1dsshRdo+rsS
tzJLpWUGzQ0cW58b8tXi9DfSGoVInKuejMet6Kudl5A7qZt+BgyhYrwx6yJJ2GX/
BgncDUHsPzMHilTmVZ/QGOgyEOerkhALKfpuiaTCHNLUnTr6pApWpHCfotFaIOJc
9eRm521GmZds07uNEaEZ94PTK/zxcHGk0QTBSdOH4NVu4TfKUmoqjg0Erd0bBn+R
QtDGC928/ygjPHjrKxFDjXtDZYsPxMe2xdAyBO7pO5Qp5+bExuM4BZCS7Y65ZwKU
VEui2zu/nHX0VlFuqf5RayfqHg/ONkKZP4QuQgVJC/2urCaUs7A=
=bGc0
-----END PGP SIGNATURE-----
Reply to: