Source: nginx Version: 1.28.1-2 Severity: important Tags: security upstream X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for nginx. CVE-2026-1642[0]: | A vulnerability exists in NGINX OSS and NGINX Plus when configured | to proxy to upstream Transport Layer Security (TLS) servers. An | attacker with a man-in-the-middle (MITM) position on the upstream | server side—along with conditions beyond the attacker's control—may | be able to inject plain text data into the response from an upstream | proxied server. Note: Software versions which have reached End of | Technical Support (EoTS) are not evaluated. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2026-1642 https://www.cve.org/CVERecord?id=CVE-2026-1642 [1] https://www.openwall.com/lists/oss-security/2026/02/05/1 [2] https://my.f5.com/manage/s/article/K000159824 [3] https://github.com/nginx/nginx/commit/784fa05025cb8cd0c770f99bc79d2794b9f85b6e Please adjust the affected versions in the BTS as needed. Regards, Salvatore

