"nginx":"1.24" nginx-1.24.0-3.module+el8+1975+4aac8b3e.ML.1
エラータID: AXSA:2026-466:01
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647)
* NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module (CVE-2026-27654)
* NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784)
* NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled (CVE-2026-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-27651
When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-27654
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-27784
The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-32647
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Modularity name: "nginx"
Stream name: "1.24"
Update packages.
When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
N/A
SRPMS
- nginx-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.src.rpm
MD5: b170f40c346421dad04a2e7c9dc58b58
SHA-256: 526400551452c2e112d116b993ca943307996bf88b89b46694a719e6963a0672
Size: 1.11 MB
Asianux Server 8 for x86_64
- nginx-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.x86_64.rpm
MD5: 506a37a72142bbd472695a04f27a7341
SHA-256: a163dab0898859af2de1aa781c6ff0212975b5a9520c0b0dd4503eb699ede3a3
Size: 599.93 kB - nginx-all-modules-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.noarch.rpm
MD5: 292defccf392174bca612fa0709e6563
SHA-256: 0009fe8de9fa9c91ab6dfd628d95349f603fb77eb18cb7fa0b5324eeaa4fc248
Size: 25.13 kB - nginx-debugsource-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.x86_64.rpm
MD5: 5c2f48228db7e70cc90d96be86eab364
SHA-256: 4f5984fe3b0670ab7f347394f58e8999d1e2b0959d6465df5597e9db32b08eaf
Size: 697.30 kB - nginx-filesystem-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.noarch.rpm
MD5: a726a5f0e54eec38444a29f0c7ae0c84
SHA-256: 004cb302ba4be37632e22397eca698fa0116ec9c61a1e400596da04f334fc654
Size: 26.11 kB - nginx-mod-devel-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.x86_64.rpm
MD5: f3b02978dee7879fb9ebf2202a159bf4
SHA-256: 81b26352e5f33ebfa0eaae110dcded103d47204e05478319395a5947fd4f808d
Size: 966.43 kB - nginx-mod-http-image-filter-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.x86_64.rpm
MD5: 3e47cf5d5c38909dc0bc6684aa94a8ea
SHA-256: ad79fa11c00144dfb0c48f817c6a9dd6d8946c865326579532b096bf02ccace8
Size: 36.54 kB - nginx-mod-http-perl-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.x86_64.rpm
MD5: dfaee889b33ea629ae874d4c94c83c4c
SHA-256: 853da90025ca440bb212c79b2c3a60fe4d48c40d67ae31feea3b74e881e6d88c
Size: 48.32 kB - nginx-mod-http-xslt-filter-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.x86_64.rpm
MD5: af3d4ac4dddb85e71f227e01b6d4e518
SHA-256: 23dce7a7d1c93cdad8c183ec8f5cf16b03dce956f4406572d98d81bc6e266cf2
Size: 35.16 kB - nginx-mod-mail-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.x86_64.rpm
MD5: 77752cad899d7cb67f3c9b50ded6589b
SHA-256: cf36ac7dec16dbfd412ae1594ebb65d31be7d912e2d282e67334a04c843efd5e
Size: 68.80 kB - nginx-mod-stream-1.24.0-3.module+el8+1975+4aac8b3e.ML.1.x86_64.rpm
MD5: 107e14ea57cdeb75a7128259d237a442
SHA-256: 77e7cd24294077692627abb3b57c035fde278b7e7a104dd395b7d197120daca6
Size: 95.77 kB