[CLSA-2026:1773137907] nginx: Fix of CVE-2026-1642
Type:
security
Severity:
Moderate
Release date:
2026-03-10 10:18:32 UTC
Description:
- CVE-2026-1642: fix upstream TLS proxy vulnerability allowing MITM inject plaintext into proxied responses; enforce strict upstream TLS verification and reject injected plaintext
Updated packages:
  • nginx-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.x86_64.rpm
    sha:30bbd7bcd725db3a95a0574924bef0a3673b721b1c78d856e553675e2c82016d
  • nginx-all-modules-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.noarch.rpm
    sha:fe15b9e06911d6ad5d957a9b91105fa8c12d97ed4a05318afdaf882c50e69f46
  • nginx-core-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.x86_64.rpm
    sha:814d30d4dcaf2efe7ce74f2edec2c061405024dee62605d261617c154c315bf4
  • nginx-filesystem-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.noarch.rpm
    sha:ef5911b129315608c92fcc19ad687a3e379b4d366dffd7926606d45417188161
  • nginx-mod-devel-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.x86_64.rpm
    sha:af177ce9afd12a8f95416322f77aa941cbcd7d91fb50e0574c612ca0e5875299
  • nginx-mod-http-image-filter-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.x86_64.rpm
    sha:45a25b7759a2e08fb2925d0598ecf190d074e9366f299ebe5c4a8ea4ede99c4e
  • nginx-mod-http-perl-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.x86_64.rpm
    sha:6242ce8673ec1d27b8b9b554ef577ef4bb4e02c7930a90e371112c697fab8bdb
  • nginx-mod-http-xslt-filter-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.x86_64.rpm
    sha:9cd049938646d615d277a5ad131da7eb734c2e9099c0c05319308d4dc8b27691
  • nginx-mod-mail-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.x86_64.rpm
    sha:03ffa65284f0cb5d957b4b3042dda8f402ca45e0fc3e5fbb5a56f818ce1a94e0
  • nginx-mod-stream-1.20.1-14.el9_2.1.alma.1.tuxcare.els4.x86_64.rpm
    sha:cf2dc8dabfc8ba6480d2808bf8dfcb97d0b66677cc963b76417166e1dcf6b235
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.