\{'type': 'Security', 'shortCode': 'RL', 'name': 'RLSA-2021:2290', 'synopsis': 'Important: nginx:1.16 security update', 'severity': 'Important', 'topic': 'An update for the nginx:1.16 module is now available for Rocky Linux 8, Rocky Linux 8.1 Extended Update Support, and Rocky Linux 8.2 Extended Update Support.\nRocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.', 'description': 'nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. \nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.', 'solution': None, 'affectedProducts': ['Rocky Linux 8'], 'fixes': ['1963121'], 'cves': ['Red Hat:::https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23017.json:::CVE-2021-23017'], 'references': [], 'publishedAt': '2021-07-22T03:13:13.199404Z', 'rpms': ['nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.src.rpm', 'nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.src.rpm', 'nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm', 'nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm', 'nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm', 'nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm', 'nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm', 'nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm', 'nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm', 'nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm', 'nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm']}\

Rocky Linux: RLSA-2021:2290 nginx

September 2, 2022
An update for the nginx:1.16 module is now available for Rocky Linux 8, Rocky Linux 8.1 Extended Update Support, and Rocky Linux 8.2 Extended Update Support. Rocky Linux Product Security has rated this update as having a security impact of Important

Summary

An update for the nginx:1.16 module is now available for Rocky Linux 8, Rocky Linux 8.1 Extended Update Support, and Rocky Linux 8.2 Extended Update Support. Rocky Linux Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

RPMs

nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.src.rpm

nginx-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.src.rpm

nginx-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-all-modules-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm

nginx-all-modules-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm

nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-debugsource-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-debugsource-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-filesystem-1.16.1-2.module+el8.4.0+543+efbf198b.1.noarch.rpm

nginx-filesystem-1.18.0-3.module+el8.4.0+544+e40554cf.1.noarch.rpm

nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-image-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-image-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-image-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-image-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-perl-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-perl-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-perl-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-perl-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-xslt-filter-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-xslt-filter-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-http-xslt-filter-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-http-xslt-filter-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-mail-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-mail-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-mail-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-mail-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-stream-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-stream-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.aarch64.rpm

nginx-mod-stream-debuginfo-1.16.1-2.module+el8.4.0+543+efbf198b.1.x86_64.rpm

nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.aarch64.rpm

nginx-mod-stream-debuginfo-1.18.0-3.module+el8.4.0+544+e40554cf.1.x86_64.rpm

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23017.json

Severity
Name: RLSA-2021:2290
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=


Related News