"nginx":"1.24" nginx-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2
エラータID: AXSA:2026-704:01
Release date:
Thursday, May 21, 2026 - 18:21
Subject:
"nginx":"1.24" nginx-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2
Affected Channels:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
nginx is a web and proxy server supporting HTTP and other protocols, with a
focus on high concurrency, performance, and low memory usage.
Security Fix(es):
nginx: NGINX: Arbitrary Code Execution Vulnerability (CVE-2026-42945)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
CVE(s):
CVE-2026-42945
Modularity name: "nginx"
Stream name: "1.24"
Solution:
Update packages.
CVEs:
CVE-2026-42945
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Additional Info:
N/A
Download:
SRPMS
- nginx-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.src.rpm
MD5: 2122423115161ca022d1e0f480ac0753
SHA-256: a5b9fba790872e565abef0fed56dcb137ce77bc8fac8a447a1d7e7ec828d2124
Size: 1.13 MB
Asianux Server 9 for x86_64
- nginx-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.x86_64.rpm
MD5: 51fb24d382b0ffe3a60c4547f372ec21
SHA-256: 24e1077952507dbbebab4d3ea99711a0e536cfd7c51d63781bd88dab489b026d
Size: 36.76 kB - nginx-all-modules-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.noarch.rpm
MD5: d94da9c2456836ed6d1d2281ffbdfae9
SHA-256: 521cd009fafffa13d822756df1090cad088f222ac851e6db134e3dfe951e88dc
Size: 8.24 kB - nginx-core-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.x86_64.rpm
MD5: cc1fbea0a60d3e980be2d988492a332e
SHA-256: 404160b2317d0a9c80aaec1dea4531f0684c6be7fd90a93e2722184e23305e26
Size: 583.49 kB - nginx-debugsource-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.x86_64.rpm
MD5: a0d96f38b091005d20982dce36527d76
SHA-256: 727c39146d2a9499fe06430ff9043d90fa968417ef565d600fb5d7b7d45e1b9b
Size: 616.96 kB - nginx-filesystem-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.noarch.rpm
MD5: f7b242af31e3fc91e3d8761cf467f911
SHA-256: c69058ffa0b085b6aa5c15a26d9f52c72b961411c37d3a515cd6f35e916bac5b
Size: 9.19 kB - nginx-mod-devel-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.x86_64.rpm
MD5: bca08c1ac6ddf2ea75d568c1487b47e7
SHA-256: f22edaedbe20167d8273fbc5196a0ac9d0ebfe6af34cdf05ea93f5b50d9a861f
Size: 882.21 kB - nginx-mod-http-image-filter-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.x86_64.rpm
MD5: ca111b6b09564d2f062de73c875594f1
SHA-256: 936d8f2a4c3f699adddbac64d517ab22c6a74dc62210c33fbb07ddd423bb8796
Size: 19.85 kB - nginx-mod-http-perl-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.x86_64.rpm
MD5: 12c9a953f0b22d773699e0f8cc80e045
SHA-256: e3c1cf6477e08ffe9cccda28a71f0955f1213a80389eeaf7dda4ad1e23f0f837
Size: 31.17 kB - nginx-mod-http-xslt-filter-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.x86_64.rpm
MD5: 22275408ec8e0be43f37321a8a5c41f7
SHA-256: d16001fff0bd55b96e74d9dfbd2e3cec415ceebf12dd339a189c9266c653fa55
Size: 18.61 kB - nginx-mod-mail-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.x86_64.rpm
MD5: 32f72cea0dd31cf4419cf83f30512fcd
SHA-256: 87b5230c16e4f3979b0120a8b813f701681126a79c5f3f0e0f13cff767f03fd8
Size: 53.47 kB - nginx-mod-stream-1.24.0-5.module+el9+1153+1e3afc3d.2.ML.2.x86_64.rpm
MD5: f55fef0562a44074d57bd6ea742d91d0
SHA-256: 018d5d0870ff177ec44af49c5285281a1174617d2ff73298d0b23fc37f5558f6
Size: 80.13 kB