[CLSA-2024:1715280815] nginx: Fix of CVE-2023-44487
Type:
security
Severity:
Important
Release date:
2024-05-09 18:53:38 UTC
Description:
- CVE-2023-44487: HTTP/2: per-iteration stream handling limit
Updated packages:
  • nginx-1.20.1-10.el7.tuxcare.els1.x86_64.rpm
    sha:f42bb4e3e477d8b9ede1ad34f100a0ba4bcf00d5
  • nginx-all-modules-1.20.1-10.el7.tuxcare.els1.noarch.rpm
    sha:926e9f1faa14ac0ec8c05e2aab693bf42707b1d1
  • nginx-filesystem-1.20.1-10.el7.tuxcare.els1.noarch.rpm
    sha:4a0593fc8dd4698a52848d8c8993c4bd5efa1ae9
  • nginx-mod-devel-1.20.1-10.el7.tuxcare.els1.x86_64.rpm
    sha:43dc00dc9376b8ce207ab6907c594b4ef42cd7e6
  • nginx-mod-http-image-filter-1.20.1-10.el7.tuxcare.els1.x86_64.rpm
    sha:0c4a5fd6ce2f4aa97329e755140a1e77eb23b21e
  • nginx-mod-http-perl-1.20.1-10.el7.tuxcare.els1.x86_64.rpm
    sha:91d5447d418b2067e5945749a8c4db42a3b2f8d1
  • nginx-mod-http-xslt-filter-1.20.1-10.el7.tuxcare.els1.x86_64.rpm
    sha:8034ea1c40309b87305212e4398a5fd3f7f34e3e
  • nginx-mod-mail-1.20.1-10.el7.tuxcare.els1.x86_64.rpm
    sha:ada6be64de13a5ddbab5815327cb4b896c2bc953
  • nginx-mod-stream-1.20.1-10.el7.tuxcare.els1.x86_64.rpm
    sha:ae67ce5506124f82cb0ecf8dfd5148a4774c9bef
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.