nginx:1.24 security update
エラータID: AXSA:2026-433:01
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
Security Fix(es):
* nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647)
* NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module (CVE-2026-27654)
* NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784)
* NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled (CVE-2026-27651)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-27651
When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-27654
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-27784
The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-32647
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Modularity name: "nginx"
Stream name: "1.24"
Update packages.
When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
N/A
SRPMS
- nginx-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.src.rpm
MD5: b75795af32a2f737c3ee18a7cff90310
SHA-256: c7c1f49a65ceb061d16cde3c9af55913ebd3aaf8ba6906e4c4e310f70da7dddf
Size: 1.13 MB
Asianux Server 9 for x86_64
- nginx-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.x86_64.rpm
MD5: 56c0c0a80fdbe6569f4a3d39e00de3a7
SHA-256: 156a05f8f0157be46ca2dc805eb6166f9af21364a099395638cf38c34f658a9b
Size: 36.59 kB - nginx-all-modules-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.noarch.rpm
MD5: 3aad1b9b07580861a6897d8f2e2fca0e
SHA-256: ab0cd997bf198282c266d9055e5b0b192016d04dc6ddbb43307cba91f0cd6b45
Size: 8.07 kB - nginx-core-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.x86_64.rpm
MD5: a3381a442233ab4a345e9916a1014b96
SHA-256: 6c628b4be9652d54ad7680620e277b1abb06b313df1356aa58eb1902a24e9087
Size: 583.34 kB - nginx-debugsource-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.x86_64.rpm
MD5: 0be0d7d4fea322ef600b586fb707ff86
SHA-256: 2655eedc9264b0845751464b8e5b43e00692371af125bf08b906a809fcf58f34
Size: 616.28 kB - nginx-filesystem-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.noarch.rpm
MD5: 32b63ca205fadf02f7592bfbebd2c971
SHA-256: 533cdbf94fda0c12bec28e465018fe3601a92c7d259a4f7bbb00d6698b928df2
Size: 9.03 kB - nginx-mod-devel-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.x86_64.rpm
MD5: 97cc4b4bf609cd831b71a87adfbda372
SHA-256: fe0010a12d0397bf9d1566e6f582079f6081d4805fb62a1c4d392a520885230c
Size: 882.05 kB - nginx-mod-http-image-filter-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.x86_64.rpm
MD5: 8178f552f8625f935c455538fd8f4f00
SHA-256: 278d32c378d44ce536096b6c9c7f4313f14094e719869c952ecc8239bc64b0e1
Size: 19.68 kB - nginx-mod-http-perl-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.x86_64.rpm
MD5: 8c09fec95f836f19b497d2d850a8e111
SHA-256: f5c5ae2f9b9ccba0205bd0708d1a566f8189d8edbeb82dbe986b5b8d1399b013
Size: 31.04 kB - nginx-mod-http-xslt-filter-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.x86_64.rpm
MD5: 5ebc1a1b18b802e41f741a8a30da236b
SHA-256: 67403afeed81de7a579f3c730e912937ba4da0c494fb3d3ca2c00fc2539ac6a0
Size: 18.44 kB - nginx-mod-mail-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.x86_64.rpm
MD5: ebbe3978a27c6b27110d2e3c873016dd
SHA-256: 8983acdeccbc22e238bd36c0a3d5e551e9b2bcd328c00af9959802eda81344d9
Size: 53.30 kB - nginx-mod-stream-1.24.0-5.module+el9+1138+0d1fdce3.2.ML.1.x86_64.rpm
MD5: cc2c3907b38a3431cfb43ceda714c3d6
SHA-256: fbc95fb82107cb204c98e9a9e815597a7b3896e535b25fb7572c83ded8653371
Size: 79.96 kB