Skip to content

[SRE-5817] Upgrade Nginx to v1.31.0#16

Draft
zacblazic wants to merge 2 commits into
masterfrom
nginx-1.31.0-cve-2026-42945
Draft

[SRE-5817] Upgrade Nginx to v1.31.0#16
zacblazic wants to merge 2 commits into
masterfrom
nginx-1.31.0-cve-2026-42945

Conversation

@zacblazic
Copy link
Copy Markdown
Member

@zacblazic zacblazic commented May 18, 2026

Overview

Upgrades Nginx to v1.31.0 to address CVE-2026-42945, a heap buffer overflow in ngx_http_rewrite_module affecting Nginx versions through 1.30.0. The upstream fix shipped in mainline 1.31.0 (and stable 1.30.1); this image stays on the mainline channel.

See F5 advisory K000161019 for the vulnerability description.

Changes

  • Upgrade base image to nginx:1.31.0-trixie. Picks up the upstream fix for CVE-2026-42945. No config changes.
  • Switch base from Debian Bookworm (12) to Debian Trixie (13). Upstream Nginx no longer publishes a -bookworm tag for 1.31.0, so the Debian variant moves to Trixie.

Risk

Low for the Nginx bump itself (same mainline channel, no config changes). The Debian Bookworm -> Trixie change is a base-OS upgrade and brings a newer glibc, OpenSSL and apt source layout. Downstream images that install extra packages on top of this base (notably docker-nginx-proxy) should be smoke-tested after rebuild to confirm apt sources and module ABIs still resolve. Consumers will pick up the fix once docker-nginx-proxy is bumped in a follow-up PR.

Related

References

@zacblazic zacblazic force-pushed the nginx-1.31.0-cve-2026-42945 branch from d53d543 to 6cf72d4 Compare May 18, 2026 14:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant