Package "nginx"

Name: nginx


This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • PAM authentication module for Nginx
  • Purge content from Nginx caches
  • WebDAV missing commands support for Nginx
  • Bring echo and more shell style goodies to Nginx

Latest version: 1.15.9-0ubuntu1.1
Release: disco (19.04)
Level: security
Repository: universe


Save this URL for the latest version of "nginx": https://www.ubuntuupdates.org/nginx

Other versions of "nginx" in Disco

Repository Area Version
base main 1.15.9-0ubuntu1
base universe 1.15.9-0ubuntu1
security main 1.15.9-0ubuntu1.1
updates main 1.15.9-0ubuntu1.1
updates universe 1.15.9-0ubuntu1.1
PPA: Nginx 1.16.1-0+disco1
PPA: Nginx from nginx.org 1.16.1-1~disco

Packages in group

Deleted packages are displayed in grey.


Version: 1.15.9-0ubuntu1.1 2019-08-15 18:07:52 UTC

  nginx (1.15.9-0ubuntu1.1) disco-security; urgency=medium

  * SECURITY UPDATE: HTTP/2 Data Dribble issue
    - debian/patches/CVE-2019-9511.patch: limited number of DATA frames in
      src/http/v2/ngx_http_v2.c, src/http/v2/ngx_http_v2.h,
    - CVE-2019-9511
  * SECURITY UPDATE: HTTP/2 Resource Loop / Priority Shuffling issue
    - debian/patches/CVE-2019-9513.patch: limited number of PRIORITY frames
      in src/http/v2/ngx_http_v2.c, src/http/v2/ngx_http_v2.h.
    - CVE-2019-9513
  * SECURITY UPDATE: HTTP/2 0-Length Headers Leak issue
    - debian/patches/CVE-2019-9516.patch: reject zero length headers with
      PROTOCOL_ERROR in src/http/v2/ngx_http_v2.c.
    - CVE-2019-9516

 -- Marc Deslauriers <email address hidden> Wed, 14 Aug 2019 14:41:19 -0400

CVE-2019-9511 Some HTTP/2 implementations are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of ser
CVE-2019-9513 Some HTTP/2 implementations are vulnerable to resource loops, potentially leading to a denial of service. The attacker creates multiple request strea
CVE-2019-9516 Some HTTP/2 implementations are vulnerable to a header leak, potentially leading to a denial of service. The attacker sends a stream of headers with

About   -   Send Feedback to @ubuntu_updates