nginx-1.20.1-24.el9_7.2.ML.1

エラータID: AXSA:2026-435:02

リリース日: 
2026/04/16 Thursday - 17:52
題名: 
nginx-1.20.1-24.el9_7.2.ML.1
影響のあるチャネル: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.

Security Fix(es):

* nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647)
* NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module (CVE-2026-27654)
* NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784)
* NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled (CVE-2026-27651)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2026-27651
When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-27654
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_dav_module module that might allow an attacker to trigger a buffer overflow to the NGINX worker process; this vulnerability may result in termination of the NGINX worker process or modification of source or destination file names outside the document root. This issue affects NGINX Open Source and NGINX Plus when the configuration file uses DAV module MOVE or COPY methods, prefix location (nonregular expression location configuration), and alias directives. The integrity impact is constrained because the NGINX worker process user has low privileges and does not have access to the entire system. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-27784
The 32-bit implementation of NGINX Open Source has a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to over-read or over-write NGINX worker memory resulting in its termination, using a specially crafted MP4 file. The issue only affects 32-bit NGINX Open Source if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CVE-2026-32647
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module module, which might allow an attacker to trigger a buffer over-read or over-write to the NGINX worker memory resulting in its termination or possibly code execution, using a specially crafted MP4 file. This issue affects NGINX Open Source and NGINX Plus if it is built with the ngx_http_mp4_module module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted MP4 file with the ngx_http_mp4_module module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. nginx-1.20.1-24.el9_7.2.ML.1.src.rpm
    MD5: 5443d2ac901f974a0a649df26a6a8001
    SHA-256: 67aca6b4a519ce959bbd1c4d8a2af00f4d23680bb9cb0f86083f9b296163f1cb
    Size: 1.08 MB

Asianux Server 9 for x86_64
  1. nginx-1.20.1-24.el9_7.2.ML.1.x86_64.rpm
    MD5: b87226927866812654112cc1063ee750
    SHA-256: 12c3ff9c2f777b800493eefc8aa59cc112d473f009df0ca269eec66950354680
    Size: 36.91 kB
  2. nginx-all-modules-1.20.1-24.el9_7.2.ML.1.noarch.rpm
    MD5: 0d704dfcb8abcd0f2b245ff6dc272256
    SHA-256: a942bb5383db204aee441031187428e1fe28366a45eb98c78800ab70300510a8
    Size: 8.59 kB
  3. nginx-core-1.20.1-24.el9_7.2.ML.1.x86_64.rpm
    MD5: 9e021802464b927eb209a2f8450414bd
    SHA-256: d92b37f8260bc99cd15717aac205bc92c05f297fbb90f48959dd156e8ca394ea
    Size: 572.99 kB
  4. nginx-filesystem-1.20.1-24.el9_7.2.ML.1.noarch.rpm
    MD5: b17873d0f8f66e8d57d11dd1875bcb5a
    SHA-256: d4ebea5deff2deb0e0c23621e195f066002a63f4de345423a216f98e48b07abd
    Size: 10.16 kB
  5. nginx-mod-devel-1.20.1-24.el9_7.2.ML.1.x86_64.rpm
    MD5: 37e472484cc4dbd881102e38b258069b
    SHA-256: 5aec74ba77bc23714dcdf67a68410abd2981abafe40673401ab782c8eb389154
    Size: 835.43 kB
  6. nginx-mod-http-image-filter-1.20.1-24.el9_7.2.ML.1.x86_64.rpm
    MD5: 742bb7cf148b6eb18169525d2260f7f3
    SHA-256: 841d6061ae7a9ad630a8ffa2354a5924662bf7c908bbc7e05a2225182aa7229b
    Size: 20.27 kB
  7. nginx-mod-http-perl-1.20.1-24.el9_7.2.ML.1.x86_64.rpm
    MD5: 04274f61c4216d2a58fb09e0b2826737
    SHA-256: b61ef20ff31ac055fcd91c6a65c65d3d04efcf8cf729109375a93ff50187a19f
    Size: 31.65 kB
  8. nginx-mod-http-xslt-filter-1.20.1-24.el9_7.2.ML.1.x86_64.rpm
    MD5: f7c2756f7536ccaeadff81b8ace72dcd
    SHA-256: e62b91f55e30044d6ac040f10883bcf8917019c9bbd1bb40be0e5881f4665b5d
    Size: 19.00 kB
  9. nginx-mod-mail-1.20.1-24.el9_7.2.ML.1.x86_64.rpm
    MD5: b4d82ea9b6acef2d4a3e74f8f8cc9ded
    SHA-256: e99c358ad92215433eda7440ea19206a1d55f9c513015d2f457d946c687f4a8e
    Size: 52.67 kB
  10. nginx-mod-stream-1.20.1-24.el9_7.2.ML.1.x86_64.rpm
    MD5: 880bfc3807df3e9cbb2fa2800418a923
    SHA-256: 44f4b852df4b9408b2b4695c330c60dc1289365d12901e0ac9ddc741f8fef71d
    Size: 77.89 kB