Bug 2450791 (CVE-2026-27651) - CVE-2026-27651 NGINX: NGINX: Denial of Service via undisclosed requests when ngx_mail_auth_http_module is enabled
Summary: CVE-2026-27651 NGINX: NGINX: Denial of Service via undisclosed requests when ...
Keywords:
Status: NEW
Alias: CVE-2026-27651
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2450834 2450837 2450838 2450839
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-24 15:02 UTC by OSIDB Bzimport
Modified: 2026-05-07 19:01 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:13634 0 None None None 2026-05-05 08:35:55 UTC
Red Hat Product Errata RHSA-2026:13680 0 None None None 2026-05-05 10:26:21 UTC
Red Hat Product Errata RHSA-2026:13839 0 None None None 2026-05-05 18:06:54 UTC
Red Hat Product Errata RHSA-2026:14836 0 None None None 2026-05-07 19:01:58 UTC
Red Hat Product Errata RHSA-2026:6906 0 None None None 2026-04-07 18:36:52 UTC
Red Hat Product Errata RHSA-2026:6907 0 None None None 2026-04-07 20:37:42 UTC
Red Hat Product Errata RHSA-2026:6923 0 None None None 2026-04-07 21:36:21 UTC
Red Hat Product Errata RHSA-2026:7002 0 None None None 2026-04-08 08:02:32 UTC
Red Hat Product Errata RHSA-2026:7343 0 None None None 2026-04-09 18:53:48 UTC

Description OSIDB Bzimport 2026-03-24 15:02:57 UTC
When the ngx_mail_auth_http_module module is enabled on NGINX Plus or NGINX Open Source, undisclosed requests can cause worker processes to terminate. This issue may occur when (1) CRAM-MD5 or APOP authentication is enabled, and (2) the authentication server permits retry by returning the Auth-Wait response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Comment 2 errata-xmlrpc 2026-04-07 18:36:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:6906 https://access.redhat.com/errata/RHSA-2026:6906

Comment 3 errata-xmlrpc 2026-04-07 20:37:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:6907 https://access.redhat.com/errata/RHSA-2026:6907

Comment 4 errata-xmlrpc 2026-04-07 21:36:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:6923 https://access.redhat.com/errata/RHSA-2026:6923

Comment 5 errata-xmlrpc 2026-04-08 08:02:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:7002 https://access.redhat.com/errata/RHSA-2026:7002

Comment 6 errata-xmlrpc 2026-04-09 18:53:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:7343 https://access.redhat.com/errata/RHSA-2026:7343

Comment 11 errata-xmlrpc 2026-05-05 08:35:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:13634 https://access.redhat.com/errata/RHSA-2026:13634

Comment 12 errata-xmlrpc 2026-05-05 10:26:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:13680 https://access.redhat.com/errata/RHSA-2026:13680

Comment 13 errata-xmlrpc 2026-05-05 18:06:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:13839 https://access.redhat.com/errata/RHSA-2026:13839

Comment 14 errata-xmlrpc 2026-05-07 19:01:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:14836 https://access.redhat.com/errata/RHSA-2026:14836


Note You need to log in before you can comment on or make changes to this bug.