nginx 0.5.6 through 1.7.4, when using the same shared sslsessioncache or sslsessionticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "nginx-light": "1.4.6-1ubuntu3.1", "nginx-core-dbg": "1.4.6-1ubuntu3.1", "nginx-full-dbg": "1.4.6-1ubuntu3.1", "nginx-light-dbg": "1.4.6-1ubuntu3.1", "nginx-extras": "1.4.6-1ubuntu3.1", "nginx-extras-dbg": "1.4.6-1ubuntu3.1", "nginx-full": "1.4.6-1ubuntu3.1", "nginx-common": "1.4.6-1ubuntu3.1", "nginx": "1.4.6-1ubuntu3.1", "nginx-naxsi-dbg": "1.4.6-1ubuntu3.1", "nginx-naxsi": "1.4.6-1ubuntu3.1", "nginx-core": "1.4.6-1ubuntu3.1", "nginx-naxsi-ui": "1.4.6-1ubuntu3.1", "nginx-doc": "1.4.6-1ubuntu3.1" } ] }