forked from pool/nghttp2
Accepting request 724578 from home:adamm:branches:devel:libraries:c_c++
- Update to version 1.39.2 (bsc#1146184, bsc#1146182): * This release fixes CVE-2019-9511 “Data Dribble” and CVE-2019-9513 “Resource Loop” vulnerability in nghttpx and nghttpd. Specially crafted HTTP/2 frames cause Denial of Service by consuming CPU time. Check out https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md for details. For nghttpx, additionally limiting inbound traffic by --read-rate and --read-burst options is quite effective against this kind of attack. * Add nghttp2_option_set_max_outbound_ack API function * nghttpx: Fix request stall OBS-URL: https://build.opensuse.org/request/show/724578 OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/nghttp2?expand=0&rev=96
This commit is contained in:
parent
5b8cf27be9
commit
dc40b8ad08
@ -1,3 +0,0 @@
|
|||||||
version https://git-lfs.github.com/spec/v1
|
|
||||||
oid sha256:679160766401f474731fd60c3aca095f88451e3cc4709b72306e4c34cf981448
|
|
||||||
size 1634512
|
|
3
nghttp2-1.39.2.tar.xz
Normal file
3
nghttp2-1.39.2.tar.xz
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
version https://git-lfs.github.com/spec/v1
|
||||||
|
oid sha256:a2d216450abd2beaf4e200c168957968e89d602ca4119338b9d7ab059fd4ce8b
|
||||||
|
size 1635428
|
@ -3,6 +3,21 @@ Mon Aug 19 12:27:38 UTC 2019 - Martin Pluskal <mpluskal@suse.com>
|
|||||||
|
|
||||||
- Require correct library from devel package - boo#1125689
|
- Require correct library from devel package - boo#1125689
|
||||||
|
|
||||||
|
-------------------------------------------------------------------
|
||||||
|
Mon Aug 19 12:02:09 UTC 2019 - Adam Majer <adam.majer@suse.de>
|
||||||
|
|
||||||
|
- Update to version 1.39.2 (bsc#1146184, bsc#1146182):
|
||||||
|
* This release fixes CVE-2019-9511 “Data Dribble” and CVE-2019-9513
|
||||||
|
“Resource Loop” vulnerability in nghttpx and nghttpd. Specially crafted HTTP/2
|
||||||
|
frames cause Denial of Service by consuming CPU time. Check out
|
||||||
|
https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
|
||||||
|
for details. For nghttpx, additionally limiting inbound traffic by
|
||||||
|
--read-rate and --read-burst options is quite effective against
|
||||||
|
this kind of attack.
|
||||||
|
|
||||||
|
* Add nghttp2_option_set_max_outbound_ack API function
|
||||||
|
* nghttpx: Fix request stall
|
||||||
|
|
||||||
-------------------------------------------------------------------
|
-------------------------------------------------------------------
|
||||||
Tue Aug 13 13:22:01 UTC 2019 - Martin Pluskal <mpluskal@suse.com>
|
Tue Aug 13 13:22:01 UTC 2019 - Martin Pluskal <mpluskal@suse.com>
|
||||||
|
|
||||||
|
@ -29,7 +29,7 @@
|
|||||||
%bcond_with python
|
%bcond_with python
|
||||||
%endif
|
%endif
|
||||||
Name: nghttp2%{psuffix}
|
Name: nghttp2%{psuffix}
|
||||||
Version: 1.39.1
|
Version: 1.39.2
|
||||||
Release: 0
|
Release: 0
|
||||||
Summary: Implementation of Hypertext Transfer Protocol version 2 in C
|
Summary: Implementation of Hypertext Transfer Protocol version 2 in C
|
||||||
License: MIT
|
License: MIT
|
||||||
|
Loading…
x
Reference in New Issue
Block a user