diff --git a/content/nginx/releases.md b/content/nginx/releases.md index 1017c16c3..749e8ff2b 100644 --- a/content/nginx/releases.md +++ b/content/nginx/releases.md @@ -53,6 +53,8 @@ NGINX Plus R35 is a feature release: - Security: SMTP Authentication process memory over-read. This vulnerability in the NGINX `ngx_mail_smtp_module` may allow an unauthenticated attacker to trigger buffer over-read, resulting in worker process memory disclosure to the authentication server ([CVE-2025-53859](https://www.cve.org/CVERecord?id=CVE-2025-53859)). +{{< call-out "note" "Learn more" >}}For highlights of all new features and enhancements in this release, see the [NGINX Plus R35 release blog](https://community.f5.com/kb/technicalarticles/f5-nginx-plus-r35-release-now-available/342962).{{< /call-out >}} + NGINX Plus R35 is supported on: @@ -82,9 +84,6 @@ NGINX Plus R35 is supported on: - SLES 15 SP6 is now required - the [ACME]({{< ref "/nginx/admin-guide/dynamic-modules/acme.md" >}}) dynamic module is new in this release. -More information: [Announcing NGINX Plus R35](https://community.f5.com/kb/TechnicalArticles/f5-nginx-plus-r35-release-now-available/342962) - - ## NGINX Plus Release 34 (R34) {#r34} _April 01, 2025_
_Based on NGINX Open Source 1.27.4_ @@ -104,6 +103,8 @@ NGINX Plus R34 is a feature release: - Security: insufficient check in virtual servers handling with TLSv1.3 SNI allowed to reuse SSL sessions in a different virtual server, to bypass client SSL certificates verification ([CVE-2025-23419](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23419)). +{{< call-out "note" "Learn more" >}}For highlights of all new features and enhancements in this release, see the [NGINX Plus R34 release blog](https://community.f5.com/kb/technicalarticles/f5-nginx-plus-r34-release-now-available/340300).{{< /call-out >}} + NGINX Plus R34 is supported on: {{}} @@ -130,9 +131,6 @@ NGINX Plus R34 is supported on: - Ubuntu 20.04 is deprecated - the [OpenTracing]({{< ref "/nginx/admin-guide/dynamic-modules/opentracing.md" >}}) dynamic module is no longer available. It is recommended to use the [OpenTelemetry Distributed Tracing]({{< ref "/nginx/admin-guide/dynamic-modules/opentelemetry.md" >}}) module, which incorporates all the features of the OpenTracing module. -More information: [Announcing NGINX Plus R34](https://community.f5.com/kb/technicalarticles/f5-nginx-plus-r34-release-now-available/340300) - - ### NGINX Plus R34 Update {#r34_p1} NGINX Plus R34 P1
@@ -185,6 +183,9 @@ The argument is a file name in the `SSLKEYLOGFILE` format compatible with Wiresh - Added initial support for Post Quantum Cryptography. +{{< call-out "note" "Learn more" >}}For highlights of all new features and enhancements in this release, see the [NGINX Plus R33 release blog](https://community.f5.com/kb/technicalarticles/f5-nginx-plus-r33-release-now-available/336403).{{< /call-out >}} + + {{}} | Distribution | Versions | |----------------------------------|-----------------------------------| @@ -213,9 +214,6 @@ The argument is a file name in the `SSLKEYLOGFILE` format compatible with Wiresh - support for s390x architecture removed - the [Lua]({{< ref "/nginx/admin-guide/dynamic-modules/lua.md" >}}) module is no longer available for SUSE Linux Enterprise Server 12 -More information: [Announcing NGINX Plus R33](https://community.f5.com/kb/technicalarticles/announcing-nginx-plus-r33-release/336403) - - ### NGINX Plus R33 Updates {#r33_p1} NGINX Plus R33 P1