From 40c9a9802c9881c7dabc88c2fbd4690bf1b35b75 Mon Sep 17 00:00:00 2001 From: oxpa Date: Wed, 13 May 2026 16:25:55 +0100 Subject: [PATCH] Updated nginx to 1.30.1. --- contrib/src/nginx/SHA512SUMS | 1 + contrib/src/nginx/version | 2 +- docs/nginx-module-acme.xml | 12 ++++ docs/nginx-module-auth-spnego.xml | 12 ++++ docs/nginx-module-brotli.xml | 12 ++++ docs/nginx-module-encrypted-session.xml | 12 ++++ docs/nginx-module-fips-check.xml | 12 ++++ docs/nginx-module-geoip.xml | 12 ++++ docs/nginx-module-geoip2.xml | 12 ++++ docs/nginx-module-headers-more.xml | 12 ++++ docs/nginx-module-image-filter.xml | 12 ++++ docs/nginx-module-lua.xml | 12 ++++ docs/nginx-module-ndk.xml | 12 ++++ docs/nginx-module-njs.xml | 12 ++++ docs/nginx-module-otel.xml | 12 ++++ docs/nginx-module-passenger.xml | 12 ++++ docs/nginx-module-perl.xml | 12 ++++ docs/nginx-module-rtmp.xml | 12 ++++ docs/nginx-module-set-misc.xml | 12 ++++ docs/nginx-module-subs-filter.xml | 12 ++++ docs/nginx-module-xslt.xml | 12 ++++ docs/nginx.xml | 87 +++++++++++++++++++++++++ 22 files changed, 317 insertions(+), 1 deletion(-) diff --git a/contrib/src/nginx/SHA512SUMS b/contrib/src/nginx/SHA512SUMS index 3b44dc40..befb7791 100644 --- a/contrib/src/nginx/SHA512SUMS +++ b/contrib/src/nginx/SHA512SUMS @@ -70,3 +70,4 @@ da5f473ac213f8947f40f0a69820bf981157432fe9d29cf71fe30225dadd05f5814309034f0411ea 00a39c8e79c98b86f814720c9f1bd87d6ec608c436f6b6dfe18c69e7ac12cb6d04f8717976653b782b59ef5b8dbf3c97c6b577b2e2c33423dd13fbe222ec9e86 nginx-1.29.7.tar.gz 6451749bf2589863f4a6fc99e31a34368877cbc3af8b1ca10c3ad53bee96a8766cf2bba7e303facb8e254cf6b18a7c1d3fdd293b6d00bb2b9a62f74143085b47 nginx-1.29.8.tar.gz 9df502279583ea305e2d7a4cbe67c54cbcdb880f1caf010d582eea8839bda3bc6dd5e244bb79e848a70ad0c9fda9927cb8d9d8c5fc1bc49acc2da9e734543d7c nginx-1.30.0.tar.gz +a081ed49692948ea61bada05a9bade88f9899f843c8d5a72c0d5362e812c14e1ea12de729bcdfe93016323fb014681ddfa472f3352b5e83455991be715293211 nginx-1.30.1.tar.gz diff --git a/contrib/src/nginx/version b/contrib/src/nginx/version index 6d04c225..a51c2915 100644 --- a/contrib/src/nginx/version +++ b/contrib/src/nginx/version @@ -1,2 +1,2 @@ -NGINX_VERSION := 1.30.0 +NGINX_VERSION := 1.30.1 NGINX_PLUS_VERSION := 37 diff --git a/docs/nginx-module-acme.xml b/docs/nginx-module-acme.xml index eb888731..2d41b9b6 100644 --- a/docs/nginx-module-acme.xml +++ b/docs/nginx-module-acme.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-auth-spnego.xml b/docs/nginx-module-auth-spnego.xml index d52e77fe..71926269 100644 --- a/docs/nginx-module-auth-spnego.xml +++ b/docs/nginx-module-auth-spnego.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-brotli.xml b/docs/nginx-module-brotli.xml index c885ae7b..a76efd52 100644 --- a/docs/nginx-module-brotli.xml +++ b/docs/nginx-module-brotli.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-encrypted-session.xml b/docs/nginx-module-encrypted-session.xml index 48fbec5a..838a7deb 100644 --- a/docs/nginx-module-encrypted-session.xml +++ b/docs/nginx-module-encrypted-session.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-fips-check.xml b/docs/nginx-module-fips-check.xml index 3a8e1a28..cc082705 100644 --- a/docs/nginx-module-fips-check.xml +++ b/docs/nginx-module-fips-check.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-geoip.xml b/docs/nginx-module-geoip.xml index 74edcfde..05fd4c2f 100644 --- a/docs/nginx-module-geoip.xml +++ b/docs/nginx-module-geoip.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-geoip2.xml b/docs/nginx-module-geoip2.xml index b1f32280..e49bac85 100644 --- a/docs/nginx-module-geoip2.xml +++ b/docs/nginx-module-geoip2.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-headers-more.xml b/docs/nginx-module-headers-more.xml index 768c1cba..d8d4431e 100644 --- a/docs/nginx-module-headers-more.xml +++ b/docs/nginx-module-headers-more.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-image-filter.xml b/docs/nginx-module-image-filter.xml index 13f6c73c..3744fd7a 100644 --- a/docs/nginx-module-image-filter.xml +++ b/docs/nginx-module-image-filter.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-lua.xml b/docs/nginx-module-lua.xml index 2f894df8..57159964 100644 --- a/docs/nginx-module-lua.xml +++ b/docs/nginx-module-lua.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-ndk.xml b/docs/nginx-module-ndk.xml index 17027f4a..101a4154 100644 --- a/docs/nginx-module-ndk.xml +++ b/docs/nginx-module-ndk.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-njs.xml b/docs/nginx-module-njs.xml index 544c9395..66efa8c8 100644 --- a/docs/nginx-module-njs.xml +++ b/docs/nginx-module-njs.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-otel.xml b/docs/nginx-module-otel.xml index 849238d1..6460b803 100644 --- a/docs/nginx-module-otel.xml +++ b/docs/nginx-module-otel.xml @@ -4,6 +4,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-passenger.xml b/docs/nginx-module-passenger.xml index f84d37c7..4431cf4b 100644 --- a/docs/nginx-module-passenger.xml +++ b/docs/nginx-module-passenger.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-perl.xml b/docs/nginx-module-perl.xml index 57187871..7042cd0c 100644 --- a/docs/nginx-module-perl.xml +++ b/docs/nginx-module-perl.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-rtmp.xml b/docs/nginx-module-rtmp.xml index dae2d27d..1a42a334 100644 --- a/docs/nginx-module-rtmp.xml +++ b/docs/nginx-module-rtmp.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-set-misc.xml b/docs/nginx-module-set-misc.xml index 32dc0172..94a1b8a3 100644 --- a/docs/nginx-module-set-misc.xml +++ b/docs/nginx-module-set-misc.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-subs-filter.xml b/docs/nginx-module-subs-filter.xml index ea3ca420..0f2aabb1 100644 --- a/docs/nginx-module-subs-filter.xml +++ b/docs/nginx-module-subs-filter.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx-module-xslt.xml b/docs/nginx-module-xslt.xml index 140d1201..afa95036 100644 --- a/docs/nginx-module-xslt.xml +++ b/docs/nginx-module-xslt.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.30.1-1 + + + + + + diff --git a/docs/nginx.xml b/docs/nginx.xml index fa966868..799b80f0 100644 --- a/docs/nginx.xml +++ b/docs/nginx.xml @@ -5,6 +5,93 @@ + + + +1.30.1-1 + + + + + +Security: when using the "proxy_set_body" directive, an attacker +might inject data in the proxied request to an HTTP/2 backend +(CVE-2026-42926). +Thanks to Mufeed VH of Winfunc Research. + + + + + +Security: a heap memory buffer overflow might occur in a worker +process while handling a specially crafted request by +ngx_http_rewrite_module, potentially resulting in arbitrary code +execution (CVE-2026-42945). +Thanks to Leo Lin. + + + + + +Security: a heap memory buffer overread might occur in a worker +process while handling a specially crafted response by +ngx_http_scgi_module or ngx_http_uwsgi_module, allowing an attacker +to cause a disclosure of worker process memory or segmentation fault +in a worker process (CVE-2026-42946). +Thanks to Leo Lin. + + + + + +Security: a heap memory buffer overread might occur in a worker +process while handling a specially sent response with decoding from +UTF-8 via the "charset_map" directive, allowing an attacker to cause +a limited disclosure of worker proccess memory or segmentation fault +in a worker process (CVE-2026-42934). +Thanks to David Carlier. + + + + + +Security: when using HTTP/3, processing of connection migration might +cause new QUIC streams to receive a new client address before +validation, allowing an attacker to cause address spoofing +(CVE-2026-40460). +Thanks to Rodrigo Laneth. + + + + + +Security: use-after-free might occur during DNS server response +processing if the "ssl_ocsp" directive was used, allowing an attacker +to cause worker process memory corruption or segmentation fault in a +worker process (CVE-2026-40701). +Thanks to Leo Lin. + + + + + +Bugfix: connections with HTTP/2 backends might not be cached when +using the "proxy_set_body" or "proxy_pass_request_body" directives. + + + + + +Bugfix: proxied HTTP/0.9, SCGI, or uWSGI responses might be +transferred incorrectly if the first line was not fully read. + + + + + +