Debian Security Advisory
DLA-3203-1 nginx -- LTS security update
- Date Reported:
- 23 Nov 2022
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 991328.
In Mitre's CVE dictionary: CVE-2021-3618, CVE-2022-41741, CVE-2022-41742.
- More information:
It was discovered that parsing errors in the mp4 module of Nginx, a high-performance web and reverse proxy server, could result in denial of service, memory disclosure or potentially the execution of arbitrary code when processing a malformed mp4 file.
This module is only enabled in the nginx-extras binary package.
In addition the following vulnerability has been fixed.
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise
For Debian 10 buster, these problems have been fixed in version 1.14.2-2+deb10u5.
We recommend that you upgrade your nginx packages.
For the detailed security status of nginx please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nginx
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS