First published: Wed May 14 2025(Updated: )
Moderate: nginx security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | ||
Red Hat CodeReady Linux Builder for IBM z Systems | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for ARM64 EUS | ||
redhat/nginx | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-all-modules | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-core | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-core-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-debugsource | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-filesystem | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-image-filter | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-image-filter-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-perl | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-perl-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-xslt-filter | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-xslt-filter-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-mail | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-mail-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-stream | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-stream-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-core | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-core-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-debugsource | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-image-filter | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-image-filter-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-perl | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-perl-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-xslt-filter | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-xslt-filter-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-mail | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-mail-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-stream | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-stream-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-core | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-core-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-debugsource | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-image-filter | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-image-filter-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-perl | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-perl-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-xslt-filter | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-http-xslt-filter-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-mail | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-mail-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-stream | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-stream-debuginfo | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-core | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-core-debuginfo | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-debuginfo | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-debugsource | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-http-image-filter | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-http-image-filter-debuginfo | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-http-perl | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-http-perl-debuginfo | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-http-xslt-filter | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-http-xslt-filter-debuginfo | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-mail | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-mail-debuginfo | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-stream | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-stream-debuginfo | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
redhat/nginx-mod-devel | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-devel | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-devel | <1.20.1-16.el9_4.3 | 1.20.1-16.el9_4.3 |
redhat/nginx-mod-devel | <1.20.1-16.el9_4.3.aa | 1.20.1-16.el9_4.3.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:7619 is categorized as moderate.
RHSA-2025:7619 addresses a memory corruption vulnerability in the ngx_http_mp4_module, identified as CVE-2022-41741.
To fix RHSA-2025:7619, you should update nginx to version 1.20.1-16.el9_4.3 or higher.
Affected products include various versions of Red Hat Enterprise Linux and CodeReady Linux Builder.
Yes, you need to update to nginx version 1.20.1-16.el9_4.3 to resolve the vulnerability.