Bug 2477116 (CVE-2026-42945) - CVE-2026-42945 nginx: NGINX: Arbitrary Code Execution Vulnerability
Summary: CVE-2026-42945 nginx: NGINX: Arbitrary Code Execution Vulnerability
Keywords:
Status: NEW
Alias: CVE-2026-42945
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2477413
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-13 16:04 UTC by OSIDB Bzimport
Modified: 2026-05-19 21:41 UTC (History)
6 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:17751 0 None None None 2026-05-15 10:09:24 UTC
Red Hat Product Errata RHSA-2026:17752 0 None None None 2026-05-15 10:26:41 UTC
Red Hat Product Errata RHSA-2026:17753 0 None None None 2026-05-15 10:30:00 UTC
Red Hat Product Errata RHSA-2026:17790 0 None None None 2026-05-15 16:24:25 UTC
Red Hat Product Errata RHSA-2026:17791 0 None None None 2026-05-15 16:13:50 UTC
Red Hat Product Errata RHSA-2026:17792 0 None None None 2026-05-15 17:10:27 UTC
Red Hat Product Errata RHSA-2026:17793 0 None None None 2026-05-15 16:27:37 UTC
Red Hat Product Errata RHSA-2026:17794 0 None None None 2026-05-15 16:35:42 UTC
Red Hat Product Errata RHSA-2026:18029 0 None None None 2026-05-18 12:58:49 UTC
Red Hat Product Errata RHSA-2026:18041 0 None None None 2026-05-18 11:49:18 UTC
Red Hat Product Errata RHSA-2026:18063 0 None None None 2026-05-18 12:54:51 UTC
Red Hat Product Errata RHSA-2026:19159 0 None None None 2026-05-19 16:10:44 UTC
Red Hat Product Errata RHSA-2026:19371 0 None None None 2026-05-19 21:41:41 UTC
Red Hat Product Errata RHSA-2026:19372 0 None None None 2026-05-19 21:41:44 UTC
Red Hat Product Errata RHSA-2026:19374 0 None None None 2026-05-19 21:41:18 UTC

Description OSIDB Bzimport 2026-05-13 16:04:51 UTC
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Comment 4 errata-xmlrpc 2026-05-15 10:09:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2026:17751 https://access.redhat.com/errata/RHSA-2026:17751

Comment 5 errata-xmlrpc 2026-05-15 10:26:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:17752 https://access.redhat.com/errata/RHSA-2026:17752

Comment 6 errata-xmlrpc 2026-05-15 10:29:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:17753 https://access.redhat.com/errata/RHSA-2026:17753

Comment 7 errata-xmlrpc 2026-05-15 16:13:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2026:17791 https://access.redhat.com/errata/RHSA-2026:17791

Comment 8 errata-xmlrpc 2026-05-15 16:24:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10.0 Extended Update Support

Via RHSA-2026:17790 https://access.redhat.com/errata/RHSA-2026:17790

Comment 9 errata-xmlrpc 2026-05-15 16:27:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:17793 https://access.redhat.com/errata/RHSA-2026:17793

Comment 10 errata-xmlrpc 2026-05-15 16:35:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.6 Extended Update Support

Via RHSA-2026:17794 https://access.redhat.com/errata/RHSA-2026:17794

Comment 11 errata-xmlrpc 2026-05-15 17:10:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2026:17792 https://access.redhat.com/errata/RHSA-2026:17792

Comment 14 errata-xmlrpc 2026-05-18 11:49:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:18041 https://access.redhat.com/errata/RHSA-2026:18041

Comment 15 errata-xmlrpc 2026-05-18 12:54:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:18063 https://access.redhat.com/errata/RHSA-2026:18063

Comment 16 errata-xmlrpc 2026-05-18 12:58:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:18029 https://access.redhat.com/errata/RHSA-2026:18029

Comment 17 errata-xmlrpc 2026-05-19 16:10:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:19159 https://access.redhat.com/errata/RHSA-2026:19159

Comment 18 errata-xmlrpc 2026-05-19 21:41:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:19374 https://access.redhat.com/errata/RHSA-2026:19374

Comment 19 errata-xmlrpc 2026-05-19 21:41:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:19371 https://access.redhat.com/errata/RHSA-2026:19371

Comment 20 errata-xmlrpc 2026-05-19 21:41:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:19372 https://access.redhat.com/errata/RHSA-2026:19372


Note You need to log in before you can comment on or make changes to this bug.