Rocky Linux: RLSA-2021:2290 nginx | LinuxSecurity.com

Advisories

\{'type': 'Security', 'shortCode': 'RL', 'name': 'RLSA-2021:2290', 'synopsis': 'Important: nginx:1.16 security update', 'severity': 'Important', 'topic': 'An update for the nginx:1.16 module is now available for Rocky Linux 8, Rocky Linux 8.1 Extended Update Support, and Rocky Linux 8.2 Extended Update Support.\nRocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.', 'description': 'nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. \nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', 'solution': None, 'affectedProducts': ['Rocky Linux 8'], 'fixes': ['1963121'], 'cves': ['Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23017.json:::CVE-2021-23017'], 'references': [], 'publishedAt': '2021-07-22T03:13:13.199404Z', 'rpms': ['nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.src.rpm', 'nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.src.rpm', 'nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm', 'nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm', 'nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm', 'nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm', 'nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm']}\

Rocky Linux: RLSA-2021:2290 nginx

September 2, 2022
An update for the nginx:1

Summary

An update for the nginx:1.16 module is now available for Rocky Linux 8, Rocky Linux 8.1 Extended Update Support, and Rocky Linux 8.2 Extended Update Support. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.src.rpm
nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.src.rpm
nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm
nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm
nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm
nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm
nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm
nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm
nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

References

Severity
Name: RLSA-2021:2290
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=1963121

CVES

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23017.json

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.