[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4228-1] nginx security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4228-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Sylvain Beucler
June 24, 2025                                 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : nginx
Version        : 1.18.0-6.1+deb11u5
CVE ID         : CVE-2020-36309 CVE-2024-33452
Debian Bug     : 986787

Two vulnerabilities were discovered in Nginx, a high-performance web
and reverse proxy server, more precisely in ngx_http_lua_module, which
embeds the Lua scripting language into Nginx. This could lead to
request smuggling or contribute to cache poisoning and authentication
bypass.

ngx_http_lua_module is provided by the optional libnginx-mod-http-lua
binary package.

CVE-2020-36309

    ngx_http_lua_module allows unsafe characters in an argument when
    using the API to mutate a URI, or a request or response header.

CVE-2024-33452

    lua-nginx-module allows a remote attacker to conduct HTTP request
    smuggling via a crafted HEAD request.

For Debian 11 bullseye, these problems have been fixed in version
1.18.0-6.1+deb11u5.

We recommend that you upgrade your nginx packages.

For the detailed security status of nginx please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nginx

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=bGc0
-----END PGP SIGNATURE-----


Reply to: