[ALSA-2020:2755] Important: nghttp2 security update
Type:
security
Severity:
important
Release date:
2023-03-13
Description:
libnghttp2 is a library implementing the Hypertext Transfer Protocol version 2 (HTTP/2) protocol in C. Security Fix(es): * nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 libnghttp2-1.33.0-3.el8_2.1.aarch64.rpm c212edaa9234b462da0f4b445466a65b3423bf39ae95a79a9d028922882c36cd
aarch64 libnghttp2-devel-1.33.0-3.el8_2.1.aarch64.rpm e0c2098672b447bf3bd43f0c4f8e47b2f1a41f481facc10e36f0545c074ee200
aarch64 nghttp2-1.33.0-3.el8_2.1.aarch64.rpm f2182dddfa7152dbe742573c2d11d16e5ffd5859f4100af906fd100b5366cef6
i686 libnghttp2-devel-1.33.0-3.el8_2.1.i686.rpm 65d8a5b2b3469b1408715d02b285d7700af5810d185de5c584db60db0b895423
i686 libnghttp2-1.33.0-3.el8_2.1.i686.rpm bc985967f917e0ddb99c9966440165b80c2df104f035968c0f58e39324e5f743
i686 libnghttp2-1.33.0-3.el8_2.1.i686.rpm bc985967f917e0ddb99c9966440165b80c2df104f035968c0f58e39324e5f743
ppc64le libnghttp2-1.33.0-3.el8_2.1.ppc64le.rpm 52cf405159c688221ee37a3fb417e3ca5e6e1dc665a321c336b987d731eadcfc
ppc64le libnghttp2-devel-1.33.0-3.el8_2.1.ppc64le.rpm be4f81dc373b81b6814e09a84bb394656564d3dd31301874167a45ef08c4d844
ppc64le nghttp2-1.33.0-3.el8_2.1.ppc64le.rpm d9406132b7c8b3ba872e07da3541d36dc3331af76a827e70a44c4cd2279a76dd
x86_64 nghttp2-1.33.0-3.el8_2.1.x86_64.rpm 786fc0578da180e0567f65f98eb23d5e34dd735dee045d07dc13968db645de7c
x86_64 libnghttp2-devel-1.33.0-3.el8_2.1.x86_64.rpm 7a0913f751f773b67ce85173ad46dae39a185597674e619a63a99a482c409cf9
x86_64 libnghttp2-1.33.0-3.el8_2.1.x86_64.rpm ec2b6aee4dc42e190d0aecb2eb236f4e0d83356ccfd8ee813cb31d1ed8da3e29
x86_64 libnghttp2-1.33.0-3.el8_2.1.x86_64.rpm ec2b6aee4dc42e190d0aecb2eb236f4e0d83356ccfd8ee813cb31d1ed8da3e29
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.