Release date:
2025-07-14 18:04:14 UTC
Description:
- CVE-2025-23419: fix issue allowing session resumption to bypass client
certificate authentication when multiple server blocks share same IP/port
Updated packages:
-
nginx-1.20.1-14.el9.1.alma.1.tuxcare.els3.x86_64.rpm
sha:8536281c406d602db7126dc7df8a33e3876bdc17c8df0001161666b2f6b1bcd1
-
nginx-all-modules-1.20.1-14.el9.1.alma.1.tuxcare.els3.noarch.rpm
sha:e565f8ed34b95ae7ca7f59683679403479560325fa4874aba6d42207f1480e6f
-
nginx-core-1.20.1-14.el9.1.alma.1.tuxcare.els3.x86_64.rpm
sha:8bb9e8488a924c5c08a68beeca8d6897c9f7b183fb4a8b376a67358e061639f0
-
nginx-filesystem-1.20.1-14.el9.1.alma.1.tuxcare.els3.noarch.rpm
sha:b506c840050186eceb0f4f082bcf15db1bc41d2f3dcb1c22241b5f6d5b05ad8f
-
nginx-mod-devel-1.20.1-14.el9.1.alma.1.tuxcare.els3.x86_64.rpm
sha:76a35d859c577d8088a305a612cabc3e23807fe40f72f8ccad066920fb7c61c3
-
nginx-mod-http-image-filter-1.20.1-14.el9.1.alma.1.tuxcare.els3.x86_64.rpm
sha:9ac637adf211e277782f817fca255d94699939aba83d83b73c91db87a873df49
-
nginx-mod-http-perl-1.20.1-14.el9.1.alma.1.tuxcare.els3.x86_64.rpm
sha:1420713d72e62afe3fb1c4111213306b9bcb50de0992c6eb6cbf1532c396805e
-
nginx-mod-http-xslt-filter-1.20.1-14.el9.1.alma.1.tuxcare.els3.x86_64.rpm
sha:fa560b3928ec3486fd5645265c46c21d28e58e6a264b23162a307050fcda41b1
-
nginx-mod-mail-1.20.1-14.el9.1.alma.1.tuxcare.els3.x86_64.rpm
sha:73a7c0717b8dfc42a7391e0f28ad53286bf729af05a6305a6b511958d993bcb2
-
nginx-mod-stream-1.20.1-14.el9.1.alma.1.tuxcare.els3.x86_64.rpm
sha:506cf028852db52418e42aa709d363306b09025ca0df9c0f405e656a0e7fb2af
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.