USN-7285-1: nginx vulnerability

Publication date

24 February 2025

Overview

Several security issues were fixed in nginx.


Packages

  • nginx - small, powerful, scalable web/proxy server

Details

It was discovered that nginx incorrectly handled when multiple
server blocks are configured to share the same IP address and port.
An attacker could use this issue to use session resumption to bypass
client certificate authentication requirements on these servers.
This issue only affected Ubuntu 24.10.

A buffer overflow and a null pointer deref was fixed in nginx rtmp module
(#LP 1977718). This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS.

It was discovered that nginx incorrectly handled when multiple
server blocks are configured to share the same IP address and port.
An attacker could use this issue to use session resumption to bypass
client certificate authentication requirements on these servers.
This issue only affected Ubuntu 24.10.

A buffer overflow and a null pointer deref was fixed in nginx rtmp module
(#LP 1977718). This issue only affected Ubuntu 20.04 LTS and
Ubuntu 22.04 LTS.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:


Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›