{"id":"USN-5371-1","summary":"nginx vulnerabilities","details":"It was discovered that nginx Lua module mishandled certain inputs.\nAn attacker could possibly use this issue to perform an HTTP Request\nSmuggling attack. This issue was fixed for Ubuntu 18.04 LTS and\nUbuntu 20.04 LTS. (CVE-2020-11724)\n\nIt was discovered that nginx Lua module mishandled certain inputs.\nAn attacker could possibly use this issue to disclose sensitive\ninformation. This issue only affects Ubuntu 18.04 LTS and\nUbuntu 20.04 LTS. (CVE-2020-36309)\n\nIt was discovered that nginx mishandled the use of \ncompatible certificates among multiple encryption protocols. \nIf a remote attacker were able to intercept the communication, \nthis issue could be used to redirect traffic between subdomains.\n(CVE-2021-3618)\n","modified":"2026-02-10T04:42:34Z","published":"2022-04-12T15:48:57Z","related":["UBUNTU-CVE-2020-11724","UBUNTU-CVE-2020-36309","UBUNTU-CVE-2021-3618"],"upstream":["CVE-2020-11724","CVE-2020-36309","CVE-2021-3618","UBUNTU-CVE-2020-11724","UBUNTU-CVE-2020-36309","UBUNTU-CVE-2021-3618"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5371-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-11724"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-36309"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-3618"}],"affected":[{"package":{"name":"nginx","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/nginx@1.10.3-0ubuntu0.16.04.5+esm3?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.10.3-0ubuntu0.16.04.5+esm3"}]}],"versions":["1.9.3-1ubuntu1","1.9.6-2ubuntu1","1.9.6-2ubuntu2","1.9.9-0ubuntu1","1.9.9-1ubuntu1","1.9.10-0ubuntu1","1.9.10-1ubuntu1","1.9.11-0ubuntu1","1.9.11-0ubuntu2","1.9.12-0ubuntu1","1.9.13-0ubuntu1","1.9.14-0ubuntu1","1.9.15-0ubuntu1","1.10.0-0ubuntu0.16.04.1","1.10.0-0ubuntu0.16.04.2","1.10.0-0ubuntu0.16.04.3","1.10.0-0ubuntu0.16.04.4","1.10.3-0ubuntu0.16.04.1","1.10.3-0ubuntu0.16.04.2","1.10.3-0ubuntu0.16.04.3","1.10.3-0ubuntu0.16.04.4","1.10.3-0ubuntu0.16.04.5","1.10.3-0ubuntu0.16.04.5+esm1","1.10.3-0ubuntu0.16.04.5+esm2"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"nginx","binary_version":"1.10.3-0ubuntu0.16.04.5+esm3"},{"binary_name":"nginx-common","binary_version":"1.10.3-0ubuntu0.16.04.5+esm3"},{"binary_name":"nginx-core","binary_version":"1.10.3-0ubuntu0.16.04.5+esm3"},{"binary_name":"nginx-extras","binary_version":"1.10.3-0ubuntu0.16.04.5+esm3"},{"binary_name":"nginx-full","binary_version":"1.10.3-0ubuntu0.16.04.5+esm3"},{"binary_name":"nginx-light","binary_version":"1.10.3-0ubuntu0.16.04.5+esm3"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-36309"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3618"}],"ecosystem":"Ubuntu:Pro:16.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5371-1.json"}},{"package":{"name":"nginx","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/nginx@1.14.0-0ubuntu1.10?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.14.0-0ubuntu1.10"}]}],"versions":["1.12.1-0ubuntu2","1.13.6-2ubuntu1","1.13.6-2ubuntu2","1.13.10-1ubuntu1","1.13.12-0ubuntu1","1.14.0-0ubuntu1","1.14.0-0ubuntu1.1","1.14.0-0ubuntu1.2","1.14.0-0ubuntu1.3","1.14.0-0ubuntu1.4","1.14.0-0ubuntu1.5","1.14.0-0ubuntu1.6","1.14.0-0ubuntu1.7","1.14.0-0ubuntu1.9"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libnginx-mod-http-auth-pam","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-cache-purge","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-dav-ext","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-echo","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-fancyindex","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-geoip","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-headers-more-filter","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-image-filter","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-lua","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-ndk","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-perl","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-subs-filter","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-uploadprogress","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-upstream-fair","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-http-xslt-filter","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-mail","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-nchan","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-rtmp","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"libnginx-mod-stream","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"nginx","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"nginx-common","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"nginx-core","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"nginx-extras","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"nginx-full","binary_version":"1.14.0-0ubuntu1.10"},{"binary_name":"nginx-light","binary_version":"1.14.0-0ubuntu1.10"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-11724"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-36309"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3618"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5371-1.json"}},{"package":{"name":"nginx","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/nginx@1.18.0-0ubuntu1.3?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.18.0-0ubuntu1.3"}]}],"versions":["1.16.1-0ubuntu2","1.16.1-0ubuntu3","1.17.5-0ubuntu1","1.17.6-0ubuntu1","1.17.7-0ubuntu1","1.17.8-0ubuntu1","1.17.8-0ubuntu2","1.17.8-0ubuntu3","1.17.9-0ubuntu1","1.17.9-0ubuntu2","1.17.9-0ubuntu3","1.17.10-0ubuntu1","1.18.0-0ubuntu1","1.18.0-0ubuntu1.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libnginx-mod-http-auth-pam","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-cache-purge","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-dav-ext","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-echo","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-fancyindex","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-geoip","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-geoip2","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-headers-more-filter","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-image-filter","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-lua","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-ndk","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-perl","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-subs-filter","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-uploadprogress","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-upstream-fair","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-http-xslt-filter","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-mail","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-nchan","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-rtmp","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"libnginx-mod-stream","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"nginx","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"nginx-common","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"nginx-core","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"nginx-extras","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"nginx-full","binary_version":"1.18.0-0ubuntu1.3"},{"binary_name":"nginx-light","binary_version":"1.18.0-0ubuntu1.3"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2020-11724"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2020-36309"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2021-3618"}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5371-1.json"}}],"schema_version":"1.7.3"}