Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:0323: Red Hat Security Advisory: nginx:1.20 security update

An update for the nginx:1.20 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2021-23017: nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
Red Hat Security Data
#vulnerability#web#linux#red_hat#nodejs#js#java#kubernetes

Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases

Red Hat Customer Portal

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio

Integration and Automation

  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager

All Products

Issued:

2022-01-31

Updated:

2022-01-31

RHSA-2022:0323 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: nginx:1.20 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the nginx:1.20 module is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.

The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030)

Security Fix(es):

  • nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 8 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 8 s390x
  • Red Hat Enterprise Linux for Power, little endian 8 ppc64le
  • Red Hat Enterprise Linux for ARM 64 8 aarch64

Fixes

  • BZ - 1963121 - CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name

Red Hat Enterprise Linux for x86_64 8

SRPM

nginx-1.20.1-1.module+el8.5.0+13723+ab304644.src.rpm

SHA-256: c7659aa81612c858a3fc40266a24fce30c92a3111838f389789be757ec12bf04

x86_64

nginx-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 6adc91c5b1e9abc8675995b5401eecb12d618308770d1208c90136681a4544b4

nginx-all-modules-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm

SHA-256: 20a165899ddb3d55f8f3eacd2d29bed82136b683f1f7cd3fb83bde153e384798

nginx-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: b47949fef0fada26503beabe179ac00e51da56213183546c1a2fb504477c78da

nginx-debugsource-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 286b49c8237a2f1def538cf2c97adbf7262c4e09c67f3acf2fa2c84550d329d6

nginx-filesystem-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm

SHA-256: 3fa39cf5e1b254cad3c0747adaf2f03ff4a0516e9c5a91c3e780e72c47f15e0d

nginx-mod-http-image-filter-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 6fde0dd4424d0115b206a7df1a0d5c44b712532ecca3894baf65fa7b1e55575b

nginx-mod-http-image-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 33a25d11552e2541d0b1eb6d45fd7b1c4e12a2ec4462cf2da37a8b08ee3efc52

nginx-mod-http-perl-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 792052deda921586495335dc8a3118ee183882c6c5f77df5d321df5d1b5fad75

nginx-mod-http-perl-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 6d4dfdadee1ae39ef982b11dcdc608e9a0ed6188393b79e566b9e22a6c5bddbf

nginx-mod-http-xslt-filter-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: db4e3c3efd27427abb1ab177eccca3849ee44dc7a67a7d76c6e588e6699e49c2

nginx-mod-http-xslt-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 05e899d860c032d8df9408d933a0cd1e3d3063ffcb1b0b2d4330f0c748572b75

nginx-mod-mail-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 0221e3e7b12a4d89c6501f77a36fc1f87ac4eb231ec22abcbaecb59866109742

nginx-mod-mail-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 3e2b0f7dd83347f26ec70322bfb5b528d251ea943e8365710e0583f4b479543f

nginx-mod-stream-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 1b102a160052c5ab63bf13aa4314404a3768a7a4f86c38bf449269c58cdb318f

nginx-mod-stream-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm

SHA-256: 2b7f7dab9a8b1f04d8809cd2c1a6b1acd88d334aac8e8a5a944822a3dd428d13

Red Hat Enterprise Linux for IBM z Systems 8

SRPM

nginx-1.20.1-1.module+el8.5.0+13723+ab304644.src.rpm

SHA-256: c7659aa81612c858a3fc40266a24fce30c92a3111838f389789be757ec12bf04

s390x

nginx-all-modules-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm

SHA-256: 20a165899ddb3d55f8f3eacd2d29bed82136b683f1f7cd3fb83bde153e384798

nginx-filesystem-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm

SHA-256: 3fa39cf5e1b254cad3c0747adaf2f03ff4a0516e9c5a91c3e780e72c47f15e0d

nginx-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: d6cf857d4482bccdc444b7e36a0a371dac60d047145dd114c8acc9f28a9d0c91

nginx-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: ba767a6487ce1d06545f36b30437e21cc0e012dbfafc9832bac0e4394163612a

nginx-debugsource-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: c8e221742792aa7a1e4742bc401ed834c9ed5071f052c75dc1c56ea3382125f3

nginx-mod-http-image-filter-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: d3cf07e8ce1f611c5f6b0585b22c26d9beaa38b13756d71c69b80bb7f7efd822

nginx-mod-http-image-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: c483c858f004b39cefe08ca978fdb32056cb8833dc304cfc0a603de35e4f0b7c

nginx-mod-http-perl-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: dfa6cea6bcca70e724bc75e7cb1fc9f45ba6daf5cfc45bd0acfa854ff3f00284

nginx-mod-http-perl-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: 64f05abe814b49b2572968da6110f476519c5cbf87394e99336bf0bf94b546e4

nginx-mod-http-xslt-filter-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: c6614fdb06d44170cf7d439461013f6da6f7785a74201cc180129c3dc101dbb3

nginx-mod-http-xslt-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: 87212a58b82a074ab8837c4f4e14324511e97ec6f1f12ccb82117f49743e94e9

nginx-mod-mail-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: e4d6ffd38caad97bf2a017ada4b762b145a607942c4852a21e1f56b4ff7b8326

nginx-mod-mail-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: 48b5e061380c192d27c796cf194c654acf9b9c041c55917206efebb2fbde451c

nginx-mod-stream-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: 37b1bc938e96266b484c9dc2b67ef99d9e591e1c35a595a22bbf0b50f953a118

nginx-mod-stream-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm

SHA-256: 14bb945d4f7d314fe5c30a99115cfd3968b0bd1cdaf1489351a3d2b22d2819c5

Red Hat Enterprise Linux for Power, little endian 8

SRPM

nginx-1.20.1-1.module+el8.5.0+13723+ab304644.src.rpm

SHA-256: c7659aa81612c858a3fc40266a24fce30c92a3111838f389789be757ec12bf04

ppc64le

nginx-all-modules-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm

SHA-256: 20a165899ddb3d55f8f3eacd2d29bed82136b683f1f7cd3fb83bde153e384798

nginx-filesystem-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm

SHA-256: 3fa39cf5e1b254cad3c0747adaf2f03ff4a0516e9c5a91c3e780e72c47f15e0d

nginx-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: 91e03751598caf796d7d34ebff4d24c289bb4f6599e978cb9a992d5feacb57f2

nginx-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: 2e3969015304fcfdc7bc6ffb78ffe97afc2534958642e9a2b039a496ae36679b

nginx-debugsource-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: 44fc3b581068655ead1bf9d70e4a0d3c89db7cd42a4639161b0ade749d5c603a

nginx-mod-http-image-filter-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: 74ffad9cb21ecf7ef04bf54e94778d14436d5148bb1bcef461bb6165b820c7af

nginx-mod-http-image-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: 5e7588767efb3690b9defa2b461cffe94a0250608569525f994e8b564a20c690

nginx-mod-http-perl-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: 328ab3bf5ee92cd72b4b481d69c262bffa317fcbb0ae54665e6cf18ee0707760

nginx-mod-http-perl-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: 5c11323b652bb3d33445cbc97c3986311e92eb67d4c98e4e7058439d59f8436b

nginx-mod-http-xslt-filter-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: c555f931fc4127d7a5d7bd69d2288148c46e81740d95aaa4c9db6bc218994bb1

nginx-mod-http-xslt-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: 6168dc9249e456321e19999a64d525b3aa0468ae11c1eb8ef867ad6f186cc732

nginx-mod-mail-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: acacb5b73d54af5fdb7d2d377ed6defd995dc5fcf12c24a21a833c71c2589d78

nginx-mod-mail-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: ed0345113236694732f43d12e3ab1f0200993b561d47ff47c2f39acd7588f867

nginx-mod-stream-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: 722bef60707d3373b1185ce94e027ed2645ca702ba60149d45ee0fe9e66afa43

nginx-mod-stream-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm

SHA-256: bac2fb7dc7c0976833ae981170f2c435d7f046e6c33337406d17fed52ac8a40c

Red Hat Enterprise Linux for ARM 64 8

SRPM

nginx-1.20.1-1.module+el8.5.0+13723+ab304644.src.rpm

SHA-256: c7659aa81612c858a3fc40266a24fce30c92a3111838f389789be757ec12bf04

aarch64

nginx-all-modules-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm

SHA-256: 20a165899ddb3d55f8f3eacd2d29bed82136b683f1f7cd3fb83bde153e384798

nginx-filesystem-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm

SHA-256: 3fa39cf5e1b254cad3c0747adaf2f03ff4a0516e9c5a91c3e780e72c47f15e0d

nginx-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: 03445293987f017f4e06556d0d3695caf5fae10497a67a5070f7309f9a65d9bb

nginx-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: bcf03dcd2331c30303a263e79e3bd1717b5128a794307722f0cf852184c20ab1

nginx-debugsource-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: ecfbd15fd1c6621923aaf930c33e0cbc9a9b69c00a333b8fa13073cf1fb8e3c0

nginx-mod-http-image-filter-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: e7649f56a5f9e11df5811d9c7e177b88fa99cc21dd0be1b65fbcf3a224ccf850

nginx-mod-http-image-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: 94bd775d5ab46927aab3a3f05ac7f09b69d044abb77e0606ba17c821c18fbbfc

nginx-mod-http-perl-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: 0943fc2af4c514c53452d6c0bc3369fcf4358930d5ec86129590ff661833b6fc

nginx-mod-http-perl-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: 1bf918ac9f3cbc30984f05ef9e6aee9f653c46a836f8f5ce76e28ccb8f54d3b7

nginx-mod-http-xslt-filter-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: f5f7ad38c663cb5428ef8708f79acbde441efeaec8fbbc3b377afc4142631de2

nginx-mod-http-xslt-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: ad5a1bb0c5a36e1adcd36fab35e84a15116722a763ea121be7ac2536ea48cb16

nginx-mod-mail-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: 294506c8ee995d7aaf1c82231c8c7c98438ea7983dc3fbbcd8506aa882af4a61

nginx-mod-mail-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: 3d2a30920b1e78fb535cedc3637f20840484fea8469f473a8203ae83cefd4a7f

nginx-mod-stream-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: 225dea91649531892238baa940b73404bd194464f5f246d907195c3eef0c7280

nginx-mod-stream-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm

SHA-256: baae2e401a930ee86d95dab99bfc975ecee15af1c34ff1dc175157423d3dbdd9

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update