Debian Package Tracker
Register | Log in
Subscribe

nginx

small, powerful, scalable web/proxy server

Choose email to subscribe with

general
  • source: nginx (main)
  • version: 1.28.3-2
  • maintainer: Debian Nginx Maintainers (archive) (DMD)
  • uploaders: Jan Mojžíš [DMD]
  • arch: all any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.18.0-6.1+deb11u3
  • o-o-sec: 1.18.0-6.1+deb11u5
  • oldstable: 1.22.1-9+deb12u3
  • old-sec: 1.22.1-9+deb12u4
  • old-p-u: 1.22.1-9+deb12u4
  • stable: 1.26.3-3+deb13u2
  • stable-sec: 1.26.3-3+deb13u2
  • testing: 1.28.3-2
  • unstable: 1.28.3-2
versioned links
  • 1.18.0-6.1+deb11u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.18.0-6.1+deb11u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.22.1-9+deb12u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.22.1-9+deb12u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.26.3-3+deb13u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.28.3-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libnginx-mod-http-geoip
  • libnginx-mod-http-image-filter
  • libnginx-mod-http-perl
  • libnginx-mod-http-xslt-filter
  • libnginx-mod-mail
  • libnginx-mod-stream
  • libnginx-mod-stream-geoip (1 bugs: 0, 1, 0, 0)
  • nginx (14 bugs: 0, 10, 4, 0)
  • nginx-common (11 bugs: 0, 9, 2, 0)
  • nginx-core
  • nginx-dev (3 bugs: 0, 1, 2, 0)
  • nginx-doc
  • nginx-extras (6 bugs: 0, 3, 3, 0)
  • nginx-full
  • nginx-light
action needed
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2013-0337: The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
Created: 2022-07-04 Last update: 2026-03-31 15:30
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2013-0337: The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
Created: 2025-08-09 Last update: 2026-03-31 15:30
9 security issues in bullseye high

There are 9 open security issues in bullseye.

6 important issues:
  • CVE-2026-27651: When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-27654: NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-27784: The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-28753: NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-28755: NGINX Plus and NGINX Open Source have a vulnerability in the ngx_stream_ssl_module module due to the improper handling of revoked certificates when configured with the ssl_verify_client on and ssl_ocsp on directives, allowing the TLS handshake to succeed even after an OCSP check identifies the certificate as revoked.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-32647: NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
2 issues postponed or untriaged:
  • CVE-2026-1642: (postponed; to be fixed through a stable update) A vulnerability exists in NGINX OSS and NGINX Plus when configured to proxy to upstream Transport Layer Security (TLS) servers. An attacker with a man-in-the-middle (MITM) position on the upstream server side—along with conditions beyond the attacker's control—may be able to inject plain text data into the response from an upstream proxied server.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2025-53859: (postponed; to be fixed through a stable update) NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
1 ignored issue:
  • CVE-2013-0337: The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
Created: 2026-03-28 Last update: 2026-03-31 15:30
5 bugs tagged patch in the BTS normal
The BTS contains patches fixing 5 bugs (12 if counting merged bugs), consider including or untagging them.
Created: 2026-03-31 Last update: 2026-03-31 17:30
3 open merge requests in Salsa normal
There are 3 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2026-03-21 18:33
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2026-02-17 Last update: 2026-02-17 09:17
7 low-priority security issues in trixie low

There are 7 open security issues in trixie.

6 issues left for the package maintainer to handle:
  • CVE-2026-27651: (needs triaging) When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-27654: (needs triaging) NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-27784: (needs triaging) The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-28753: (needs triaging) NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-28755: (needs triaging) NGINX Plus and NGINX Open Source have a vulnerability in the ngx_stream_ssl_module module due to the improper handling of revoked certificates when configured with the ssl_verify_client on and ssl_ocsp on directives, allowing the TLS handshake to succeed even after an OCSP check identifies the certificate as revoked.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-32647: (needs triaging) NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

You can find information about how to handle these issues in the security team's documentation.

1 ignored issue:
  • CVE-2013-0337: The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
Created: 2025-08-09 Last update: 2026-03-31 15:30
debian/patches: 4 patches to forward upstream low

Among the 4 debian patches available in version 1.28.3-2 of the package, we noticed the following issues:

  • 4 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-03-28 06:21
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2026-02-17 Last update: 2026-02-17 12:32
No known security issue in bookworm wishlist

There is 1 open security issue in bookworm.

1 ignored issue:
  • CVE-2013-0337: The default configuration of nginx, possibly 1.3.13 and earlier, uses world-readable permissions for the (1) access.log and (2) error.log files, which allows local users to obtain sensitive information by reading the files.
6 issues that should be fixed with the next stable update:
  • CVE-2026-27651: When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-27654: NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-27784: The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-28753: NGINX Plus and NGINX Open Source have a vulnerability in the ngx_mail_smtp_module module due to the improper handling of CRLF sequences in DNS responses. This allows an attacker-controlled DNS server to inject arbitrary headers into SMTP upstream requests, leading to potential request manipulation. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-28755: NGINX Plus and NGINX Open Source have a vulnerability in the ngx_stream_ssl_module module due to the improper handling of revoked certificates when configured with the ssl_verify_client on and ssl_ocsp on directives, allowing the TLS handshake to succeed even after an OCSP check identifies the certificate as revoked.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
  • CVE-2026-32647: NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Created: 2023-06-10 Last update: 2026-03-31 15:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2026-03-31 Last update: 2026-03-31 15:01
testing migrations
  • This package will soon be part of the nginx-abi-1.28.3-1 transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • This package will soon be part of the auto-perl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2026-03-27] Accepted nginx 1.28.3-2 (source) into unstable (Jan Mojžíš)
  • [2026-03-27] Accepted nginx 1.28.3-1 (source) into experimental (Jan Mojžíš)
  • [2026-03-23] Accepted nginx 1.28.2-4 (source) into experimental (Jan Mojžíš)
  • [2026-03-21] Accepted nginx 1.28.2-3 (source) into unstable (Jan Mojžíš)
  • [2026-02-24] nginx 1.28.2-2 MIGRATED to testing (Debian testing watch)
  • [2026-02-19] Accepted nginx 1.26.3-3+deb13u2 (source amd64 all) into proposed-updates (Debian FTP Masters) (signed by: Jan Mojžíš)
  • [2026-02-19] Accepted nginx 1.22.1-9+deb12u4 (source amd64 all) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Jan Mojžíš)
  • [2026-02-16] Accepted nginx 1.28.2-2 (source) into unstable (Jan Mojžíš)
  • [2026-02-12] Accepted nginx 1.22.1-9+deb12u4 (source amd64 all) into oldstable-security (Debian FTP Masters) (signed by: Jan Mojžíš)
  • [2026-02-12] Accepted nginx 1.26.3-3+deb13u2 (source amd64 all) into stable-security (Debian FTP Masters) (signed by: Jan Mojžíš)
  • [2026-02-11] nginx 1.28.1-3 MIGRATED to testing (Debian testing watch)
  • [2026-02-10] Accepted nginx 1.28.2-1 (source) into experimental (Jan Mojžíš)
  • [2026-02-09] Accepted nginx 1.28.1-3 (source) into unstable (Jan Mojžíš)
  • [2025-12-30] nginx 1.28.1-2 MIGRATED to testing (Debian testing watch)
  • [2025-12-26] Accepted nginx 1.28.1-2 (source) into unstable (Jan Mojžíš)
  • [2025-12-24] Accepted nginx 1.28.1-1 (source) into experimental (Jan Mojžíš)
  • [2025-09-11] nginx 1.28.0-6 MIGRATED to testing (Debian testing watch)
  • [2025-09-09] nginx 1.28.0-5 MIGRATED to testing (Debian testing watch)
  • [2025-09-08] Accepted nginx 1.28.0-6 (source) into unstable (Jan Mojžíš)
  • [2025-09-06] Accepted nginx 1.28.0-5 (source) into unstable (Jan Mojžíš)
  • [2025-09-05] Accepted nginx 1.28.0-4 (source) into unstable (Jan Mojžíš)
  • [2025-08-30] Accepted nginx 1.22.1-9+deb12u3 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Jan Mojžíš)
  • [2025-08-30] Accepted nginx 1.26.3-3+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Jan Mojžíš)
  • [2025-08-30] nginx 1.28.0-3 MIGRATED to testing (Debian testing watch)
  • [2025-08-26] Accepted nginx 1.28.0-3 (source) into unstable (Jan Mojžíš)
  • [2025-08-16] Accepted nginx 1.28.0-2 (source) into experimental (Jan Mojžíš)
  • [2025-08-12] Accepted nginx 1.28.0-1 (source) into experimental (Jan Mojžíš)
  • [2025-06-24] Accepted nginx 1.18.0-6.1+deb11u5 (source) into oldstable-security (Sylvain Beucler)
  • [2025-06-05] nginx 1.26.3-3 MIGRATED to testing (Debian testing watch)
  • [2025-05-15] Accepted nginx 1.26.3-3 (source) into unstable (Jan Mojžíš)
  • 1
  • 2
bugs [bug history graph]
  • all: 44 52
  • RC: 0
  • I&N: 26
  • M&W: 16 24
  • F&P: 2
  • patch: 5 12
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • l10n (100, -)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.28.2-2ubuntu1
  • 20 bugs (1 patch)
  • patches for 1.28.2-2ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing