rpm package
opensuse/nghttp2&distro=openSUSE Leap 15.2
pkg:rpm/opensuse/nghttp2&distro=openSUSE%20Leap%2015.2
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-11080 | — | < 1.40.0-lp152.2.6.1 | 1.40.0-lp152.2.6.1 | Jun 3, 2020 | In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. T | ||
| CVE-2019-18802 | — | < 1.40.0-lp152.2.3.1 | 1.40.0-lp152.2.3.1 | Dec 13, 2019 | An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one c |
- CVE-2020-11080Jun 3, 2020affected < 1.40.0-lp152.2.6.1fixed 1.40.0-lp152.2.6.1
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. T
- CVE-2019-18802Dec 13, 2019affected < 1.40.0-lp152.2.3.1fixed 1.40.0-lp152.2.3.1
An issue was discovered in Envoy 1.12.0. An untrusted remote client may send an HTTP header (such as Host) with whitespace after the header content. Envoy will treat "header-value " as a different string from "header-value" so for example with the Host header "example.com " one c