-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6131-1 [email protected] https://www.debian.org/security/ Moritz Muehlenhoff February 12, 2026 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : nginx CVE ID : CVE-2026-1642 A vulnerability has been discovered in Nginx, a high-performance web and reverse proxy server: If configured to proxy to an upstream TLS server, a man-in-the-middle injection attack was possible. For the oldstable distribution (bookworm), this problem has been fixed in version 1.22.1-9+deb12u4. For the stable distribution (trixie), this problem has been fixed in version 1.26.3-3+deb13u2. We recommend that you upgrade your nginx packages. For the detailed security status of nginx please refer to its security tracker page at: https://security-tracker.debian.org/tracker/nginx Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: [email protected] -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmmOLKQACgkQEMKTtsN8 TjY5AA/+O1edmjVT/VXpLgk4JnJV1Iek2uzTgilG0l/rRx71vXCKsqLGtVrzpnzg OBgp5Nsnqu8Boxe/g4K5Ubje8iCyaFiHeSvLm8Z++yW9CP1FG9WWx/6mPsup0AQp GBrIrTIr095P/OIWw6pj1BUHyXU4FJs+sf+0GAk4lwMpeKSihLwq+4I1QZk5kqTt vB9F38Xw/PNM832fd3qFM9fmNACEVftX63Eoa8FN/30wVYB2le4TE5axhbiUQxoJ YwenTaofnMH4QKnG3shNnl0QIKVNZYZyLithuU7lWVVU4/isx31y4bi5EW1bRsv/ DFOPJyAZ1FhnEACEd5Ppw16iv6OMHXHtGcXLGuphgif65kassFOwDhey8SFye4Qm sAQe1i3NJkkbVHWd/FiAkhi8886Qk6JNlZm7T+wjNfAspYHwNLIyWTSTbn27sYfh yH0Es/DTIOTBrPYuVF9G3XievYnijO9bUNzkECmHkDxn6hOASA92vhifb19z89oK nsxr1pN6KX86QTda+mru6yVndG3WmAgk5z07GJtyIRl/SzIFwMiTfV33eOc8h+Lb PYMnSaqBb/i/DudCGHQChX/MPV6Y0scGQgSw34wjsCbFsmpNNLtdSbzDs2jDvazJ oKkDJai33U0dz5QDStxj1yIJV1RMIoeOC3sVtihyS7ZzmFoA7+8= =ItYS -----END PGP SIGNATURE-----

