First published: Wed Jan 15 2020(Updated: )
USN-4235-1 fixed a vulnerability in nginx. This update provides the corresponding update for Ubuntu 14.04 ESM. Original advisory details: Bert JW Regeer and Francisco Oca Gonzalez discovered that nginx incorrectly handled certain error_page configurations. A remote attacker could possibly use this issue to perform HTTP request smuggling attacks and access resources contrary to expectations.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/nginx-extras | <1.4.6-1ubuntu3.9+esm1 | 1.4.6-1ubuntu3.9+esm1 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/nginx-core | <1.4.6-1ubuntu3.9+esm1 | 1.4.6-1ubuntu3.9+esm1 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/nginx-common | <1.4.6-1ubuntu3.9+esm1 | 1.4.6-1ubuntu3.9+esm1 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/nginx-full | <1.4.6-1ubuntu3.9+esm1 | 1.4.6-1ubuntu3.9+esm1 |
Ubuntu Linux | =14.04 | |
All of | ||
ubuntu/nginx-light | <1.4.6-1ubuntu3.9+esm1 | 1.4.6-1ubuntu3.9+esm1 |
Ubuntu Linux | =14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this nginx vulnerability is CVE-2019-20372.
The severity of CVE-2019-20372 is not mentioned in the provided information. Please refer to the official advisory for more details.
The nginx vulnerability affects Ubuntu 14.04 and can be fixed by applying the corresponding update.
The vulnerability affects nginx versions up to and including 1.4.6-1ubuntu3.9+esm1.
To fix the nginx vulnerability, update the affected packages to version 1.4.6-1ubuntu3.9+esm1 or later.