摘要:
nginx security update
安全等级: Medium
公告ID: KylinSec-SA-2025-1631
发布日期: 2025年3月18日
关联CVE: CVE-2025-23419
NGINX is a free, open-source, high-performance HTTP server and reverse proxy, as well as an IMAP/POP3 proxy server.
Security Fix(es):
When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers. This vulnerability arises when TLS Session Tickets https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key are used and/or the SSL session cache https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_cache are used in the default server and the default server is performing client certificate authentication.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.(CVE-2025-23419)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2025-23419 | KY3.4-5A | nginx | Fixed |
CVE-2025-23419 | V6 | nginx | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
nginx-all-modules | noarch | 1.21.5-6.ky3_4.kb1 |
nginx-filesystem | noarch | 1.21.5-6.ky3_4.kb1 |
nginx | x86_64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-devel | x86_64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-http-image-filter | x86_64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-http-perl | x86_64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-http-xslt-filter | x86_64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-mail | x86_64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-stream | x86_64 | 1.21.5-6.ky3_4.kb1 |
nginx | aarch64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-devel | aarch64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-http-image-filter | aarch64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-http-perl | aarch64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-http-xslt-filter | aarch64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-mail | aarch64 | 1.21.5-6.ky3_4.kb1 |
nginx-mod-stream | aarch64 | 1.21.5-6.ky3_4.kb1 |
软件名称 | 架构 | 版本号 |
---|---|---|
nginx-all-modules | noarch | 1.24.0-3.ks6.kb1 |
nginx-filesystem | noarch | 1.24.0-3.ks6.kb1 |
nginx-help | noarch | 1.24.0-3.ks6.kb1 |
nginx | x86_64 | 1.24.0-3.ks6.kb1 |
nginx-mod-devel | x86_64 | 1.24.0-3.ks6.kb1 |
nginx-mod-http-image-filter | x86_64 | 1.24.0-3.ks6.kb1 |
nginx-mod-http-perl | x86_64 | 1.24.0-3.ks6.kb1 |
nginx-mod-http-xslt-filter | x86_64 | 1.24.0-3.ks6.kb1 |
nginx-mod-mail | x86_64 | 1.24.0-3.ks6.kb1 |
nginx-mod-stream | x86_64 | 1.24.0-3.ks6.kb1 |
nginx | aarch64 | 1.24.0-3.ks6.kb1 |
nginx-mod-devel | aarch64 | 1.24.0-3.ks6.kb1 |
nginx-mod-http-image-filter | aarch64 | 1.24.0-3.ks6.kb1 |
nginx-mod-http-perl | aarch64 | 1.24.0-3.ks6.kb1 |
nginx-mod-http-xslt-filter | aarch64 | 1.24.0-3.ks6.kb1 |
nginx-mod-mail | aarch64 | 1.24.0-3.ks6.kb1 |
nginx-mod-stream | aarch64 | 1.24.0-3.ks6.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名