nginx-1.20.1-22.el9.ML.1
エラータID: AXSA:2025-10304:01
リリース日:
2025/07/01 Tuesday - 03:12
題名:
nginx-1.20.1-22.el9.ML.1
影響のあるチャネル:
MIRACLE LINUX 9 for x86_64
Severity:
Moderate
Description:
以下項目について対処しました。
[Security Fix]
- nginx には、複数のサーバー間で同一の IP アドレスとポート番号を
共有している場合、リモートの攻撃者により、セッションの再開を介して、
クライアント証明書を用いた認証の迂回を可能とする脆弱性が存在します。
(CVE-2025-23419)
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2025-23419
When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers. This vulnerability arises when TLS Session Tickets https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key are used and/or the SSL session cache https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_cache are used in the default server and the default server is performing client certificate authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers. This vulnerability arises when TLS Session Tickets https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key are used and/or the SSL session cache https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_cache are used in the default server and the default server is performing client certificate authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
追加情報:
N/A
ダウンロード:
SRPMS
- nginx-1.20.1-22.el9.ML.1.src.rpm
MD5: 567c2d38b36deaf9f150ad30b63128f6
SHA-256: 45974bd5eab571073781cb05df41f9597c9344a60fe3a7f476915ad9abd47b93
Size: 1.07 MB
Asianux Server 9 for x86_64
- nginx-1.20.1-22.el9.ML.1.x86_64.rpm
MD5: e7a371ca82fc958a125a4e1b7e0f01c2
SHA-256: d64cafa7b80b95d482bad6b78cbb46bd542300e21e82728e8eb7ae0a6b9d0226
Size: 35.71 kB - nginx-all-modules-1.20.1-22.el9.ML.1.noarch.rpm
MD5: ee4d91ae85acf584eb48ce4ab04e3f06
SHA-256: 0d607a461c9f5ab88f3da26a8136df0b624c87d89fa3984ee8b18951b00dbc99
Size: 7.37 kB - nginx-core-1.20.1-22.el9.ML.1.x86_64.rpm
MD5: a82ee9f1298734ddb62355280c85c09f
SHA-256: 27e11b6bf094aa4296967e660409de6764952d702a11d3c73da10858309e3439
Size: 571.33 kB - nginx-filesystem-1.20.1-22.el9.ML.1.noarch.rpm
MD5: 05b25cd5c01e797b788ccf994b8d7497
SHA-256: 82e37018ce214b73f791fb28d12ff524d54c9f0ca76f9d184075a93da66c73ad
Size: 8.96 kB - nginx-mod-devel-1.20.1-22.el9.ML.1.x86_64.rpm
MD5: b9b3b6d24d8c004e9833013d073ddf50
SHA-256: abead8b50487c8a08b87d5519ceefb831b54a695e5192ef9c9ced2d5aa79b9d2
Size: 832.92 kB - nginx-mod-http-image-filter-1.20.1-22.el9.ML.1.x86_64.rpm
MD5: 5c32f8350b938056d17d0e4d7e05d060
SHA-256: 0bf860b2b0051c88f1a533c0a3d3d3eeaf45dc41066614d0046f93f76e9e290b
Size: 19.05 kB - nginx-mod-http-perl-1.20.1-22.el9.ML.1.x86_64.rpm
MD5: 45d7caea29f507ffd6825d3ddbdff74d
SHA-256: 7ad0e77ca513a2f63a9b8333555dcb5cb30098a9a8e0b7e96e38b1ab859f1b14
Size: 30.45 kB - nginx-mod-http-xslt-filter-1.20.1-22.el9.ML.1.x86_64.rpm
MD5: 46742e3706a37877410551875c23ce9c
SHA-256: 8f464ae7e0897594317eb4169c19ca31bcf589f408756b1b8c2ce827b9a379c9
Size: 17.80 kB - nginx-mod-mail-1.20.1-22.el9.ML.1.x86_64.rpm
MD5: 781053d2aa41a13fe213937f896f6b36
SHA-256: d67f0020e54eee18c6b950cd2359931fa31df1f0c2d03046b86b86a15c82e18a
Size: 51.43 kB - nginx-mod-stream-1.20.1-22.el9.ML.1.x86_64.rpm
MD5: 400fbe298165e2e6c05c9a14a5bc2c6e
SHA-256: bc80074c3cdc02956aa46f292703dec791b4e6659b33c0c9b431b5da69fb8890
Size: 76.63 kB