security update to 1.30.1;
- HTTP/2 request injection vulnerability in the ngx_http_proxy_module
(CVE-2026-42926)
- buffer overflow vulnerability in the ngx_http_rewrite_module
(CVE-2026-42945)
- buffer overread vulnerability in the ngx_http_scgi_module and ngx_http_uwsgi_module
(CVE-2026-42946)
- buffer overread vulnerability in the ngx_http_charset_module
(CVE-2026-42934)
- address spoofing vulnerability in HTTP/3
(CVE-2026-40460)
- use-after-free vulnerability in OCSP requests to resolver
(CVE-2026-40701)
dhcpleased: Make sure to use VIS_NL with stravis()
Various DHCP fields could include newlines, these were written to the lease file as-is. Nothing in base reads them, but it could confuse other tools.
ok florian@
dhcpleased: Validate size of imsg_dhcp.len
If the frontend manages to write something bad to imsg (bypassing the frontend's validation), where imsg_dhcp.len is > sizeof(imsg_dhcp.packet) it is possible for an OOB read to be forced in the engine. Make this fatal.
ok florian@
mitigate AMD Zen-2 operation cache corruption
On Zen 2, the operation cache can be used to change instructions
of a different privilege level.
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7052.html
The mitigation is setting a chicken bit in an MSR. This is not documented
publicly, even in the security bulletin. The value comes from a patch
submitted to Linux by AMD employees.
ok deraadt@ brynet@