Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.2

Nginx update fixes four security risks: Denial of Service and Code Execution

RLSA-2026:7343
Summary

A security update is available for Nginx, a popular web server software. This update fixes four security issues that could allow hackers to crash the server, modify files, or execute malicious code. To protect your server, apply the update as soon as possible.

What to do
  • Update nginx to version 2:1.26.3-2.module+el9.7.0+40103+2443f6d1.
Affected software
VendorProductAffected versionsFix available
– nginx <= 2:1.26.3-2.module+el9.7.0+40103+2443f6d1 2:1.26.3-2.module+el9.7.0+40103+2443f6d1
Original title
Important: nginx:1.26 security update
Original description
nginx is a web and proxy server supporting HTTP and other protocols, with a focus on high concurrency, performance, and low memory usage.

Security Fix(es):

* nginx: NGINX: Denial of Service or Code Execution via specially crafted MP4 files (CVE-2026-32647)

* NGINX: NGINX: Denial of Service or file modification via buffer overflow in ngx_http_dav_module (CVE-2026-27654)

* NGINX: NGINX: Denial of Service due to memory corruption via crafted MP4 file (CVE-2026-27784)

* NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled (CVE-2026-27651)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
osv CVSS3.1 8.2
Published: 10 Apr 2026 · Updated: 10 Apr 2026 · First seen: 10 Apr 2026