-
Notifications
You must be signed in to change notification settings - Fork 0
/
USN-5371-2.json
77 lines (77 loc) · 3.44 KB
/
USN-5371-2.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
{
"id": "USN-5371-2",
"summary": "nginx vulnerability",
"details": "USN-5371-1 fixed several vulnerabilities in nginx.\nThis update provides the fix for CVE-2021-3618 for Ubuntu 22.04 LTS.\n\nOriginal advisory details:\n\n It was discovered that nginx Lua module mishandled certain inputs.\n An attacker could possibly use this issue to perform an HTTP Request\n Smuggling attack. This issue was fixed for Ubuntu 18.04 LTS and\n Ubuntu 20.04 LTS. (CVE-2020-11724)\n \n It was discovered that nginx Lua module mishandled certain inputs.\n An attacker could possibly use this issue to disclose sensitive\n information. This issue only affects Ubuntu 18.04 LTS and\n Ubuntu 20.04 LTS. (CVE-2020-36309)\n \n It was discovered that nginx mishandled the use of \n compatible certificates among multiple encryption protocols. \n If a remote attacker were able to intercept the communication, \n this issue could be used to redirect traffic between subdomains.\n (CVE-2021-3618)\n",
"aliases": [],
"related": [
"CVE-2021-3618"
],
"published": "2022-04-28T08:34:24.888913Z",
"modified": "2022-04-28T08:34:24.888913Z",
"affected": [
{
"package": {
"ecosystem": "Ubuntu:22.04:LTS",
"name": "nginx"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "0"
},
{
"fixed": "1.18.0-6ubuntu14.1"
}
]
}
],
"ecosystem_specific": {
"binaries": [
{
"libnginx-mod-stream": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-subs-filter": "1.18.0-6ubuntu14.1",
"nginx-doc": "1.18.0-6ubuntu14.1",
"libnginx-mod-mail": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-image-filter": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-echo": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-geoip": "1.18.0-6ubuntu14.1",
"libnginx-mod-nchan": "1.18.0-6ubuntu14.1",
"nginx-common": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-fancyindex": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-auth-pam": "1.18.0-6ubuntu14.1",
"nginx-light": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-headers-more-filter": "1.18.0-6ubuntu14.1",
"nginx-extras": "1.18.0-6ubuntu14.1",
"libnginx-mod-stream-geoip2": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-upstream-fair": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-xslt-filter": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-perl": "1.18.0-6ubuntu14.1",
"nginx-core": "1.18.0-6ubuntu14.1",
"libnginx-mod-stream-geoip": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-dav-ext": "1.18.0-6ubuntu14.1",
"nginx": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-ndk": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-uploadprogress": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-cache-purge": "1.18.0-6ubuntu14.1",
"nginx-full": "1.18.0-6ubuntu14.1",
"libnginx-mod-http-geoip2": "1.18.0-6ubuntu14.1",
"libnginx-mod-rtmp": "1.18.0-6ubuntu14.1"
}
],
"availability": "No subscription needed"
}
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/notices/USN-5371-2"
},
{
"type": "REPORT",
"url": "https://ubuntu.com/security/CVE-2021-3618"
}
]
}