** Description changed:
The following was put out in a security advisory notice over nginx-
announce's mailing list today:
+
+ http://mailman.nginx.org/pipermail/nginx-announce/2018/000220.html
Hello!
Two security issues were identified in nginx HTTP/2 implementation,
which might cause excessive memory consumption (CVE-2018-16843)
and CPU usage (CVE-2018-16844).
The issues affect nginx compiled with the ngx_http_v2_module (not
compiled by default) if the "http2" option of the "listen" directive is
used in a configuration file.
The issues affect nginx 1.9.5 - 1.15.5.
The issues are fixed in nginx 1.15.6, 1.14.1.
Thanks to Gal Goldshtein from F5 Networks for initial report of the CPU
usage issue.
-----
Based on the version strings specified, the following Ubuntu versions of
nginx are affected:
* Xenial (1.9.15-0ubuntu1, 1.10.3-0ubuntu0.16.04.2)
* Bionic (1.14.0-0ubuntu1, 1.14.0-0ubuntu1.1)
* Cosmic (1.15.0-0ubuntu1, 1.15.0-0ubuntu2)
* Disco (1.15.0-0ubuntu1, 1.15.0-0ubuntu3)
** Changed in: nginx (Ubuntu Xenial)
Importance: Undecided => Medium
** Changed in: nginx (Ubuntu Bionic)
Importance: Undecided => Medium
** Changed in: nginx (Ubuntu Cosmic)
Importance: Undecided => Medium
** Changed in: nginx (Ubuntu Disco)
Importance: Undecided => Medium
** Changed in: nginx (Ubuntu Disco)
Assignee: (unassigned) => Thomas Ward (teward)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1801982
Title:
Security Advisory - Nov. 6, 2018 - CVE-2018-16843, CVE-2018-16844
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/1801982/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs