Headline
RHSA-2022:0323: Red Hat Security Advisory: nginx:1.20 security update
An update for the nginx:1.20 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2021-23017: nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
Skip to navigation Skip to main content
Utilities
- Subscriptions
- Downloads
- Containers
- Support Cases
Infrastructure and Management
- Red Hat Enterprise Linux
- Red Hat Virtualization
- Red Hat Identity Management
- Red Hat Directory Server
- Red Hat Certificate System
- Red Hat Satellite
- Red Hat Subscription Management
- Red Hat Update Infrastructure
- Red Hat Insights
- Red Hat Ansible Automation Platform
Cloud Computing
- Red Hat OpenShift
- Red Hat CloudForms
- Red Hat OpenStack Platform
- Red Hat OpenShift Container Platform
- Red Hat OpenShift Data Science
- Red Hat OpenShift Online
- Red Hat OpenShift Dedicated
- Red Hat Advanced Cluster Security for Kubernetes
- Red Hat Advanced Cluster Management for Kubernetes
- Red Hat Quay
- Red Hat CodeReady Workspaces
- Red Hat OpenShift Service on AWS
Storage
- Red Hat Gluster Storage
- Red Hat Hyperconverged Infrastructure
- Red Hat Ceph Storage
- Red Hat OpenShift Data Foundation
Runtimes
- Red Hat Runtimes
- Red Hat JBoss Enterprise Application Platform
- Red Hat Data Grid
- Red Hat JBoss Web Server
- Red Hat Single Sign On
- Red Hat support for Spring Boot
- Red Hat build of Node.js
- Red Hat build of Thorntail
- Red Hat build of Eclipse Vert.x
- Red Hat build of OpenJDK
- Red Hat build of Quarkus
- Red Hat CodeReady Studio
Integration and Automation
- Red Hat Process Automation
- Red Hat Process Automation Manager
- Red Hat Decision Manager
All Products
Issued:
2022-01-31
Updated:
2022-01-31
RHSA-2022:0323 - Security Advisory
- Overview
- Updated Packages
Synopsis
Important: nginx:1.20 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for the nginx:1.20 module is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.
The following packages have been upgraded to a later upstream version: nginx (1.20.1). (BZ#2031030)
Security Fix(es):
- nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name (CVE-2021-23017)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for ARM 64 8 aarch64
Fixes
- BZ - 1963121 - CVE-2021-23017 nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name
Red Hat Enterprise Linux for x86_64 8
SRPM
nginx-1.20.1-1.module+el8.5.0+13723+ab304644.src.rpm
SHA-256: c7659aa81612c858a3fc40266a24fce30c92a3111838f389789be757ec12bf04
x86_64
nginx-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 6adc91c5b1e9abc8675995b5401eecb12d618308770d1208c90136681a4544b4
nginx-all-modules-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm
SHA-256: 20a165899ddb3d55f8f3eacd2d29bed82136b683f1f7cd3fb83bde153e384798
nginx-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: b47949fef0fada26503beabe179ac00e51da56213183546c1a2fb504477c78da
nginx-debugsource-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 286b49c8237a2f1def538cf2c97adbf7262c4e09c67f3acf2fa2c84550d329d6
nginx-filesystem-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm
SHA-256: 3fa39cf5e1b254cad3c0747adaf2f03ff4a0516e9c5a91c3e780e72c47f15e0d
nginx-mod-http-image-filter-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 6fde0dd4424d0115b206a7df1a0d5c44b712532ecca3894baf65fa7b1e55575b
nginx-mod-http-image-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 33a25d11552e2541d0b1eb6d45fd7b1c4e12a2ec4462cf2da37a8b08ee3efc52
nginx-mod-http-perl-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 792052deda921586495335dc8a3118ee183882c6c5f77df5d321df5d1b5fad75
nginx-mod-http-perl-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 6d4dfdadee1ae39ef982b11dcdc608e9a0ed6188393b79e566b9e22a6c5bddbf
nginx-mod-http-xslt-filter-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: db4e3c3efd27427abb1ab177eccca3849ee44dc7a67a7d76c6e588e6699e49c2
nginx-mod-http-xslt-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 05e899d860c032d8df9408d933a0cd1e3d3063ffcb1b0b2d4330f0c748572b75
nginx-mod-mail-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 0221e3e7b12a4d89c6501f77a36fc1f87ac4eb231ec22abcbaecb59866109742
nginx-mod-mail-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 3e2b0f7dd83347f26ec70322bfb5b528d251ea943e8365710e0583f4b479543f
nginx-mod-stream-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 1b102a160052c5ab63bf13aa4314404a3768a7a4f86c38bf449269c58cdb318f
nginx-mod-stream-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.x86_64.rpm
SHA-256: 2b7f7dab9a8b1f04d8809cd2c1a6b1acd88d334aac8e8a5a944822a3dd428d13
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
nginx-1.20.1-1.module+el8.5.0+13723+ab304644.src.rpm
SHA-256: c7659aa81612c858a3fc40266a24fce30c92a3111838f389789be757ec12bf04
s390x
nginx-all-modules-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm
SHA-256: 20a165899ddb3d55f8f3eacd2d29bed82136b683f1f7cd3fb83bde153e384798
nginx-filesystem-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm
SHA-256: 3fa39cf5e1b254cad3c0747adaf2f03ff4a0516e9c5a91c3e780e72c47f15e0d
nginx-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: d6cf857d4482bccdc444b7e36a0a371dac60d047145dd114c8acc9f28a9d0c91
nginx-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: ba767a6487ce1d06545f36b30437e21cc0e012dbfafc9832bac0e4394163612a
nginx-debugsource-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: c8e221742792aa7a1e4742bc401ed834c9ed5071f052c75dc1c56ea3382125f3
nginx-mod-http-image-filter-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: d3cf07e8ce1f611c5f6b0585b22c26d9beaa38b13756d71c69b80bb7f7efd822
nginx-mod-http-image-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: c483c858f004b39cefe08ca978fdb32056cb8833dc304cfc0a603de35e4f0b7c
nginx-mod-http-perl-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: dfa6cea6bcca70e724bc75e7cb1fc9f45ba6daf5cfc45bd0acfa854ff3f00284
nginx-mod-http-perl-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: 64f05abe814b49b2572968da6110f476519c5cbf87394e99336bf0bf94b546e4
nginx-mod-http-xslt-filter-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: c6614fdb06d44170cf7d439461013f6da6f7785a74201cc180129c3dc101dbb3
nginx-mod-http-xslt-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: 87212a58b82a074ab8837c4f4e14324511e97ec6f1f12ccb82117f49743e94e9
nginx-mod-mail-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: e4d6ffd38caad97bf2a017ada4b762b145a607942c4852a21e1f56b4ff7b8326
nginx-mod-mail-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: 48b5e061380c192d27c796cf194c654acf9b9c041c55917206efebb2fbde451c
nginx-mod-stream-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: 37b1bc938e96266b484c9dc2b67ef99d9e591e1c35a595a22bbf0b50f953a118
nginx-mod-stream-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.s390x.rpm
SHA-256: 14bb945d4f7d314fe5c30a99115cfd3968b0bd1cdaf1489351a3d2b22d2819c5
Red Hat Enterprise Linux for Power, little endian 8
SRPM
nginx-1.20.1-1.module+el8.5.0+13723+ab304644.src.rpm
SHA-256: c7659aa81612c858a3fc40266a24fce30c92a3111838f389789be757ec12bf04
ppc64le
nginx-all-modules-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm
SHA-256: 20a165899ddb3d55f8f3eacd2d29bed82136b683f1f7cd3fb83bde153e384798
nginx-filesystem-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm
SHA-256: 3fa39cf5e1b254cad3c0747adaf2f03ff4a0516e9c5a91c3e780e72c47f15e0d
nginx-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: 91e03751598caf796d7d34ebff4d24c289bb4f6599e978cb9a992d5feacb57f2
nginx-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: 2e3969015304fcfdc7bc6ffb78ffe97afc2534958642e9a2b039a496ae36679b
nginx-debugsource-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: 44fc3b581068655ead1bf9d70e4a0d3c89db7cd42a4639161b0ade749d5c603a
nginx-mod-http-image-filter-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: 74ffad9cb21ecf7ef04bf54e94778d14436d5148bb1bcef461bb6165b820c7af
nginx-mod-http-image-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: 5e7588767efb3690b9defa2b461cffe94a0250608569525f994e8b564a20c690
nginx-mod-http-perl-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: 328ab3bf5ee92cd72b4b481d69c262bffa317fcbb0ae54665e6cf18ee0707760
nginx-mod-http-perl-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: 5c11323b652bb3d33445cbc97c3986311e92eb67d4c98e4e7058439d59f8436b
nginx-mod-http-xslt-filter-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: c555f931fc4127d7a5d7bd69d2288148c46e81740d95aaa4c9db6bc218994bb1
nginx-mod-http-xslt-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: 6168dc9249e456321e19999a64d525b3aa0468ae11c1eb8ef867ad6f186cc732
nginx-mod-mail-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: acacb5b73d54af5fdb7d2d377ed6defd995dc5fcf12c24a21a833c71c2589d78
nginx-mod-mail-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: ed0345113236694732f43d12e3ab1f0200993b561d47ff47c2f39acd7588f867
nginx-mod-stream-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: 722bef60707d3373b1185ce94e027ed2645ca702ba60149d45ee0fe9e66afa43
nginx-mod-stream-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.ppc64le.rpm
SHA-256: bac2fb7dc7c0976833ae981170f2c435d7f046e6c33337406d17fed52ac8a40c
Red Hat Enterprise Linux for ARM 64 8
SRPM
nginx-1.20.1-1.module+el8.5.0+13723+ab304644.src.rpm
SHA-256: c7659aa81612c858a3fc40266a24fce30c92a3111838f389789be757ec12bf04
aarch64
nginx-all-modules-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm
SHA-256: 20a165899ddb3d55f8f3eacd2d29bed82136b683f1f7cd3fb83bde153e384798
nginx-filesystem-1.20.1-1.module+el8.5.0+13723+ab304644.noarch.rpm
SHA-256: 3fa39cf5e1b254cad3c0747adaf2f03ff4a0516e9c5a91c3e780e72c47f15e0d
nginx-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: 03445293987f017f4e06556d0d3695caf5fae10497a67a5070f7309f9a65d9bb
nginx-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: bcf03dcd2331c30303a263e79e3bd1717b5128a794307722f0cf852184c20ab1
nginx-debugsource-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: ecfbd15fd1c6621923aaf930c33e0cbc9a9b69c00a333b8fa13073cf1fb8e3c0
nginx-mod-http-image-filter-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: e7649f56a5f9e11df5811d9c7e177b88fa99cc21dd0be1b65fbcf3a224ccf850
nginx-mod-http-image-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: 94bd775d5ab46927aab3a3f05ac7f09b69d044abb77e0606ba17c821c18fbbfc
nginx-mod-http-perl-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: 0943fc2af4c514c53452d6c0bc3369fcf4358930d5ec86129590ff661833b6fc
nginx-mod-http-perl-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: 1bf918ac9f3cbc30984f05ef9e6aee9f653c46a836f8f5ce76e28ccb8f54d3b7
nginx-mod-http-xslt-filter-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: f5f7ad38c663cb5428ef8708f79acbde441efeaec8fbbc3b377afc4142631de2
nginx-mod-http-xslt-filter-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: ad5a1bb0c5a36e1adcd36fab35e84a15116722a763ea121be7ac2536ea48cb16
nginx-mod-mail-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: 294506c8ee995d7aaf1c82231c8c7c98438ea7983dc3fbbcd8506aa882af4a61
nginx-mod-mail-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: 3d2a30920b1e78fb535cedc3637f20840484fea8469f473a8203ae83cefd4a7f
nginx-mod-stream-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: 225dea91649531892238baa940b73404bd194464f5f246d907195c3eef0c7280
nginx-mod-stream-debuginfo-1.20.1-1.module+el8.5.0+13723+ab304644.aarch64.rpm
SHA-256: baae2e401a930ee86d95dab99bfc975ecee15af1c34ff1dc175157423d3dbdd9
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.