Antoine Delignat-Lavaud and Karthikeyan Bhargavan discovered that nginx incorrectly reused cached SSL sessions. An attacker could possibly use this issue in certain configurations to obtain access to information from a different virtual host.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "nginx", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-common", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-core", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-core-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-doc", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-extras", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-extras-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-full", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-full-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-light", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-light-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-naxsi", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-naxsi-dbg", "binary_version": "1.4.6-1ubuntu3.1" }, { "binary_name": "nginx-naxsi-ui", "binary_version": "1.4.6-1ubuntu3.1" } ] }