nginx 0.5.6 through 1.7.4, when using the same shared sslsessioncache or sslsessionticket_key for multiple servers, can reuse a cached SSL session for an unrelated context, which allows remote attackers with certain privileges to conduct "virtual host confusion" attacks.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-common" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-core" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-core-dbg" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-doc" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-extras" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-extras-dbg" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-full" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-full-dbg" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-light" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-light-dbg" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-naxsi" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-naxsi-dbg" }, { "binary_version": "1.4.6-1ubuntu3.1", "binary_name": "nginx-naxsi-ui" } ] }