----- Forwarded message from F5SIRT via nginx-announce 
<nginx-annou...@nginx.org> -----

To: "nginx-annou...@nginx.org" <nginx-annou...@nginx.org>
Date: Wed, 5 Feb 2025 17:23:12 +0000
Subject: [nginx-announce] nginx security advisory (CVE-2025-23419)
From: F5SIRT via nginx-announce <nginx-annou...@nginx.org>
Reply-To: F5SIRT <f5s...@f5.com>

A problem with SSL session resumption in nginx was identified.
It was possible to reuse SSL sessions in named-based
virtual hosts in unrelated contexts, allowing to bypass client
certificate authentication in some configurations (CVE-2025-23419).

The problem affects nginx 1.11.4 and newer built with OpenSSL if the
TLSv1.3 protocol and session resumption are enabled either with
ssl_session_cache or ssl_session_tickets.

The problem is fixed in 1.26.3 and 1.27.4.
_______________________________________________
nginx-announce mailing list
nginx-annou...@nginx.org
https://mailman.nginx.org/mailman/listinfo/nginx-announce

----- End forwarded message -----

Reply via email to