Binary Evidence-Driven Vulnerability Scanning: Eliminating False Positives with OpenResty XRay
OpenResty 1.29.2.4 Released
lijunlong , 19 May 2026 (created 19 May 2026)We are happy to announce the new formal release, 1.29.2.4, of the OpenResty web platform based on NGINX and LuaJIT.
The (portable) source code distribution, the pre-built binary Linux packages for Ubuntu, Debian, Fedora, CentOS, RHEL, OpenSUSE, Amazon Linux are provided on this Download page.
Version highlights
- backported patches from nginx
- CVE-2026-42945: Buffer overflow in the ngx_http_rewrite_module
- CVE-2026-42946: Buffer overread in the ngx_http_scgi_module and ngx_http_uwsgi_module
- CVE-2026-42934: Buffer overread in the ngx_http_charset_module
- CVE-2026-40460: HTTP/3 address spoofing
- CVE-2026-40701: resolver use-after-free in OCSP
Complete change logs since the last (formal) release, 1.29.2.3, can be browsed in the page Change Log for 1.29.2.x.
Testing
We have run extensive testing on our Amazon EC2 test cluster and ensured that all the components (including the Nginx core) play well together. The latest test report can always be found here:
We also always run our OpenResty Edge commercial software based on the latest open source version of OpenResty in our own global CDN network (dubbed "mini CDN") powering our openresty.org and openresty.com websites. See https://openresty.com/ for more details.
Community Support
See the Community Page.
Commercial Support
Commercial technical support and real-time noninvasive online monitoring and profiling solution is provided through the official OpenResty XRay product.
Feedback
Feedback on this release is more than welcome. Feel free to create new GitHub issues or send emails to one of our mailing lists.
















