Description
nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4335-1 | nginx security update |
EUVD |
EUVD-2018-8640 | nginx before versions 1.15.6 and 1.14.1 has a vulnerability in the implementation of HTTP/2 that can allow for excessive CPU usage. This issue affects nginx compiled with the ngx_http_v2_module (not compiled by default) if the 'http2' option of the 'listen' directive is used in a configuration file. |
Ubuntu USN |
USN-3812-1 | nginx vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T10:32:54.086Z
Reserved: 2018-09-11T00:00:00.000Z
Link: CVE-2018-16844
No data.
Status : Modified
Published: 2018-11-07T14:29:00.837
Modified: 2024-11-21T03:53:25.810
Link: CVE-2018-16844
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN