\{'type': 'Security', 'shortCode': 'RL', 'name': 'RLSA-2021:2259', 'synopsis': 'Important: nginx:1.18 security update', 'severity': 'Important', 'topic': 'An update for the nginx:1.18 module is now available for Rocky Linux 8.\nRocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.', 'description': 'nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. \nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', 'solution': None, 'affectedProducts': ['Rocky Linux 8'], 'fixes': ['1963121'], 'cves': ['Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23017.json:::CVE-2021-23017'], 'references': [], 'publishedAt': '2021-07-22T03:13:29.157519Z', 'rpms': ['nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.src.rpm', 'nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.src.rpm', 'nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm', 'nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm', 'nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm', 'nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm', 'nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm']}\

Rocky Linux: RLSA-2021:2259 nginx

September 2, 2022
An update for the nginx:1.18 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important

Summary

An update for the nginx:1.18 module is now available for Rocky Linux 8. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.src.rpm

nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.src.rpm

nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm

nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm

nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm

nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm

nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23017.json

Severity
Name: RLSA-2021:2259
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=


Related News