Skip to content

[SECURITY] nginx 1.30.1 / 1.31.0 security advisories (2026-05-13): please rebuild image #609

@billchurch

Description

@billchurch

Is this a new feature request?

  • I have searched the existing issues

Wanted change

Summary

nginx just released released 1.30.1 (stable) and 1.31.0 (mainline) on 2026-05-13 addressing six CVEs. Several are directly relevant to SWAG's role as a reverse proxy doing TLS termination, OCSP stapling, and (optionally) HTTP/2 + HTTP/3. Requesting an image rebuild against the patched nginx version.

Relevance to SWAG

  • CVE-2026-42926 affects the proxy module, which is the core of every SWAG deployment.
  • CVE-2026-42945 affects the rewrite module, which most SWAG site configs use.
  • CVE-2026-40701 affects OCSP requests to the resolver; SWAG performs OCSP stapling against the Let's Encrypt chain by default.
  • CVE-2026-40460 applies to HTTP/3, which is opt-in on SWAG but increasingly enabled by users.

References

Environment

  • Image: lscr.io/linuxserver/swag:latest
  • Affected nginx versions: anything currently pinned in the build (prior to 1.30.1)

Reason for change

CVEs fixed

CVE Module Class
CVE-2026-42926 ngx_http_proxy_module HTTP/2 request injection
CVE-2026-42945 ngx_http_rewrite_module Buffer overflow
CVE-2026-42946 ngx_http_scgi_module, ngx_http_uwsgi_module Buffer overread
CVE-2026-42934 ngx_http_charset_module Buffer overread
CVE-2026-40460 HTTP/3 Address spoofing
CVE-2026-40701 OCSP resolver Use-after-free

Proposed code change

Request

Rebuild the linuxserver/swag image against nginx 1.30.1 (stable) so downstream deployments can pick up the fixes. Happy to validate a :nightly or pre-release tag if it's helpful before promotion to :latest.

Metadata

Metadata

Assignees

No one assigned

    Labels

    enhancementNew feature or request

    Type

    No type

    Projects

    Status

    Done

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions