Skip to content

Conversation

@ngates87
Copy link
Collaborator

No description provided.

ctrochalakis and others added 30 commits August 13, 2019 22:30
Those were forgotten during the upload, but let's add them
for completeness.

Gbp-Dch: Ignore
Gbp-Dch: Ignore
Several security issues were identified in nginx HTTP/2
implementation, which might cause excessive memory consumption
and CPU usage (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516).

The issues affect nginx compiled with the ngx_http_v2_module (not
compiled by default) if the "http2" option of the "listen" directive
is used in a configuration file.

The issues affect nginx 1.9.5 - 1.17.2.
The issues are fixed in nginx 1.17.3, 1.16.1.

Thanks to Jonathan Looney from Netflix for discovering these issues.
Nginx before 1.17.7, with certain error_page configurations, allows HTTP
request smuggling, as demonstrated by the ability of an attacker to read
unauthorized web pages in environments where NGINX is being fronted by a
load balancer.
Enable --with-compat configure option (Closes: #897926)

See merge request nginx-team/nginx!6
Update to upstream version '1.18.0'
with Debian dir 0330ecd
onovy and others added 29 commits June 4, 2020 09:41
Co-authored-by: Ondřej Nový <onovy@debian.org>
Version of nginx identical to that of nginx-full, but without
any third-party modules, and only modules in the original nginx
code base.
…3860).

* Revert: libnginx-mod-* now depends on nginx-<any flavour> (Closes: 963860).
* libnginx-mod-* recommends nginx now.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants