From 522d38b4755e191032977bcb6d1390badec645d5 Mon Sep 17 00:00:00 2001 From: oxpa Date: Wed, 13 May 2026 16:15:28 +0100 Subject: [PATCH] Updated nginx to 1.31.0. --- contrib/src/nginx/SHA512SUMS | 1 + contrib/src/nginx/version | 2 +- docs/nginx-module-acme.xml | 12 ++++ docs/nginx-module-auth-spnego.xml | 12 ++++ docs/nginx-module-brotli.xml | 12 ++++ docs/nginx-module-encrypted-session.xml | 12 ++++ docs/nginx-module-fips-check.xml | 12 ++++ docs/nginx-module-geoip.xml | 12 ++++ docs/nginx-module-geoip2.xml | 12 ++++ docs/nginx-module-headers-more.xml | 12 ++++ docs/nginx-module-image-filter.xml | 12 ++++ docs/nginx-module-lua.xml | 12 ++++ docs/nginx-module-ndk.xml | 12 ++++ docs/nginx-module-njs.xml | 12 ++++ docs/nginx-module-otel.xml | 12 ++++ docs/nginx-module-passenger.xml | 12 ++++ docs/nginx-module-perl.xml | 12 ++++ docs/nginx-module-rtmp.xml | 12 ++++ docs/nginx-module-set-misc.xml | 12 ++++ docs/nginx-module-subs-filter.xml | 12 ++++ docs/nginx-module-xslt.xml | 12 ++++ docs/nginx.xml | 73 +++++++++++++++++++++++++ 22 files changed, 303 insertions(+), 1 deletion(-) diff --git a/contrib/src/nginx/SHA512SUMS b/contrib/src/nginx/SHA512SUMS index d5a3c763..38884829 100644 --- a/contrib/src/nginx/SHA512SUMS +++ b/contrib/src/nginx/SHA512SUMS @@ -69,3 +69,4 @@ da5f473ac213f8947f40f0a69820bf981157432fe9d29cf71fe30225dadd05f5814309034f0411ea 82a3ab42f8606111ea78c5739c04b0033dcc6a0fad29ebb509661b0d0299728f15bb2443fb7ca0c5e08e6a230aa37ee75a599d29856fa8d8803d3905003f09f8 nginx-1.29.6.tar.gz 00a39c8e79c98b86f814720c9f1bd87d6ec608c436f6b6dfe18c69e7ac12cb6d04f8717976653b782b59ef5b8dbf3c97c6b577b2e2c33423dd13fbe222ec9e86 nginx-1.29.7.tar.gz 6451749bf2589863f4a6fc99e31a34368877cbc3af8b1ca10c3ad53bee96a8766cf2bba7e303facb8e254cf6b18a7c1d3fdd293b6d00bb2b9a62f74143085b47 nginx-1.29.8.tar.gz +b4964c8eaa28093880acb3dca46bc02bb9a7c91ba0a8346a1c2686509d29d0c0748044e6b8bcfffd7bd1f13c15f15ed6b2c15dc10fc003a927ce92134c809167 nginx-1.31.0.tar.gz diff --git a/contrib/src/nginx/version b/contrib/src/nginx/version index 3aa5d950..5633bae3 100644 --- a/contrib/src/nginx/version +++ b/contrib/src/nginx/version @@ -1,2 +1,2 @@ -NGINX_VERSION := 1.29.8 +NGINX_VERSION := 1.31.0 NGINX_PLUS_VERSION := 37 diff --git a/docs/nginx-module-acme.xml b/docs/nginx-module-acme.xml index eba344c3..d21bb1af 100644 --- a/docs/nginx-module-acme.xml +++ b/docs/nginx-module-acme.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-auth-spnego.xml b/docs/nginx-module-auth-spnego.xml index 7106ee1c..e6bb9714 100644 --- a/docs/nginx-module-auth-spnego.xml +++ b/docs/nginx-module-auth-spnego.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-brotli.xml b/docs/nginx-module-brotli.xml index e92fe511..1b08df06 100644 --- a/docs/nginx-module-brotli.xml +++ b/docs/nginx-module-brotli.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-encrypted-session.xml b/docs/nginx-module-encrypted-session.xml index b698d3c0..43ea6e17 100644 --- a/docs/nginx-module-encrypted-session.xml +++ b/docs/nginx-module-encrypted-session.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-fips-check.xml b/docs/nginx-module-fips-check.xml index b6188ec9..581c2a08 100644 --- a/docs/nginx-module-fips-check.xml +++ b/docs/nginx-module-fips-check.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-geoip.xml b/docs/nginx-module-geoip.xml index 44058c87..0d256607 100644 --- a/docs/nginx-module-geoip.xml +++ b/docs/nginx-module-geoip.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-geoip2.xml b/docs/nginx-module-geoip2.xml index 5dfaae2b..721fd812 100644 --- a/docs/nginx-module-geoip2.xml +++ b/docs/nginx-module-geoip2.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-headers-more.xml b/docs/nginx-module-headers-more.xml index 699ec570..9278c384 100644 --- a/docs/nginx-module-headers-more.xml +++ b/docs/nginx-module-headers-more.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-image-filter.xml b/docs/nginx-module-image-filter.xml index 380c2364..e8292d71 100644 --- a/docs/nginx-module-image-filter.xml +++ b/docs/nginx-module-image-filter.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-lua.xml b/docs/nginx-module-lua.xml index b0e75f9a..77a5394c 100644 --- a/docs/nginx-module-lua.xml +++ b/docs/nginx-module-lua.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-ndk.xml b/docs/nginx-module-ndk.xml index 04674fba..d936da9b 100644 --- a/docs/nginx-module-ndk.xml +++ b/docs/nginx-module-ndk.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-njs.xml b/docs/nginx-module-njs.xml index dca532b7..358175ff 100644 --- a/docs/nginx-module-njs.xml +++ b/docs/nginx-module-njs.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-otel.xml b/docs/nginx-module-otel.xml index 64563984..f7fe6edf 100644 --- a/docs/nginx-module-otel.xml +++ b/docs/nginx-module-otel.xml @@ -4,6 +4,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-passenger.xml b/docs/nginx-module-passenger.xml index f2f9c7d3..2a1b5cf3 100644 --- a/docs/nginx-module-passenger.xml +++ b/docs/nginx-module-passenger.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-perl.xml b/docs/nginx-module-perl.xml index a86f2d69..0c683a13 100644 --- a/docs/nginx-module-perl.xml +++ b/docs/nginx-module-perl.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-rtmp.xml b/docs/nginx-module-rtmp.xml index bad42bbd..c9602854 100644 --- a/docs/nginx-module-rtmp.xml +++ b/docs/nginx-module-rtmp.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-set-misc.xml b/docs/nginx-module-set-misc.xml index 64a89a64..a9027524 100644 --- a/docs/nginx-module-set-misc.xml +++ b/docs/nginx-module-set-misc.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-subs-filter.xml b/docs/nginx-module-subs-filter.xml index 941ce6e1..e844e804 100644 --- a/docs/nginx-module-subs-filter.xml +++ b/docs/nginx-module-subs-filter.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx-module-xslt.xml b/docs/nginx-module-xslt.xml index afecedbb..8576400d 100644 --- a/docs/nginx-module-xslt.xml +++ b/docs/nginx-module-xslt.xml @@ -5,6 +5,18 @@ + + + +base version updated to 1.31.0-1 + + + + + + diff --git a/docs/nginx.xml b/docs/nginx.xml index b105d3a5..bb191b78 100644 --- a/docs/nginx.xml +++ b/docs/nginx.xml @@ -5,6 +5,79 @@ + + + +1.31.0-1 + + + + + +Security: when using the "proxy_set_body" directive, an attacker +might inject data in the proxied request to an HTTP/2 backend +(CVE-2026-42926). +Thanks to Mufeed VH of Winfunc Research. + + + + + +Security: a heap memory buffer overflow might occur in a worker +process while handling a specially crafted request by +ngx_http_rewrite_module, potentially resulting in arbitrary code +execution (CVE-2026-42945). +Thanks to Leo Lin. + + + + + +Security: a heap memory buffer overread might occur in a worker +process while handling a specially crafted response by +ngx_http_scgi_module or ngx_http_uwsgi_module, allowing an attacker +to cause a disclosure of worker process memory or segmentation fault +in a worker process (CVE-2026-42946). +Thanks to Leo Lin. + + + + + +Security: a heap memory buffer overread might occur in a worker +process while handling a specially sent response with decoding from +UTF-8 via the "charset_map" directive, allowing an attacker to cause +a limited disclosure of worker proccess memory or segmentation fault +in a worker process (CVE-2026-42934). +Thanks to David Carlier. + + + + + +Security: when using HTTP/3, processing of connection migration might +cause new QUIC streams to receive a new client address before +validation, allowing an attacker to cause address spoofing +(CVE-2026-40460). +Thanks to Rodrigo Laneth. + + + + + +Security: use-after-free might occur during DNS server response +processing if the "ssl_ocsp" directive was used, allowing an attacker +to cause worker process memory corruption or segmentation fault in a +worker process (CVE-2026-40701). +Thanks to Leo Lin. + + + + + +