File _patchinfo of Package patchinfo.40418
<patchinfo incident="40418">
<issue tracker="cve" id="2025-53859"/>
<issue tracker="cve" id="2025-23419"/>
<issue tracker="bnc" id="1236851">VUL-0: CVE-2025-23419: nginx: client certificate authentication bypass with TLSv1.3 and session resumption</issue>
<issue tracker="bnc" id="1248070">VUL-0: CVE-2025-53859: nginx: arbitrary data leak during the NGINX SMTP authentication process</issue>
<packager>fschnizlein</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for nginx</summary>
<description>This update for nginx fixes the following issues:
- CVE-2025-53859: the server side may leak arbitrary bytes during the NGINX SMTP authentication process (bsc#1248070).
- CVE-2025-23419: session resumption can bypass client certificate authentication requirements using TLSv1.3
(bsc#1236851).
</description>
</patchinfo>