[USN-6142-1] nghttp2 vulnerability
Severity
High
Affected Packages
21
CVEs
1
nghttp2 could be made to crash if it opened a specially crafted file.
Gal Goldshtein discovered that nghttp2 incorrectly handled certain inputs. If
a user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service.
- ID
- USN-6142-1
- Severity
- high
- Severity from
- CVE-2020-11080
- URL
- https://ubuntu.com/security/notices/USN-6142-1
- Published
-
2023-06-06T08:20:51
(15 months ago) - Modified
-
2023-06-06T08:20:51
(15 months ago) - Other Advisories
-
- ALAS-2020-1404
- ALAS2-2020-1445
- ALPINE:CVE-2020-11080
- ALSA-2020:2755
- ALSA-2020:2848
- ALSA-2020:2852
- DSA-4696-1
- ELSA-2020-2755
- ELSA-2020-2848
- ELSA-2020-2852
- ELSA-2020-5765
- FEDORA-2020-43d5a372fc
- FEDORA-2020-f7d15c8b77
- FREEBSD:11FCFA8F-AC64-11EA-9DAB-000D3AB229D6
- FREEBSD:4BB56D2F-A5B0-11EA-A860-08002728F74C
- MS:CVE-2020-11080
- openSUSE-SU-2020:0802-1
- openSUSE-SU-2021:0468-1
- RHSA-2020:2755
- RHSA-2020:2848
- RHSA-2020:2852
- RLSA-2020:2755
- RLSA-2020:2848
- RLSA-2020:2852
- SUSE-SU-2020:1568-1
- SUSE-SU-2020:1575-1
- SUSE-SU-2020:1576-1
- SUSE-SU-2020:1606-1
- SUSE-SU-2020:2800-1
- SUSE-SU-2021:0930-1
- SUSE-SU-2021:0931-1
- SUSE-SU-2021:0932-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/nghttp2?distro=xenial | ubuntu | nghttp2 | < 1.7.1-1ubuntu0.1~esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nghttp2?distro=focal | ubuntu | nghttp2 | < 1.40.0-1ubuntu0.1 | focal | ||
Affected | pkg:deb/ubuntu/nghttp2?distro=bionic | ubuntu | nghttp2 | < 1.30.0-1ubuntu1+esm1 | bionic | ||
Affected | pkg:deb/ubuntu/nghttp2-server?distro=xenial | ubuntu | nghttp2-server | < 1.7.1-1ubuntu0.1~esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nghttp2-server?distro=focal | ubuntu | nghttp2-server | < 1.40.0-1ubuntu0.1 | focal | ||
Affected | pkg:deb/ubuntu/nghttp2-server?distro=bionic | ubuntu | nghttp2-server | < 1.30.0-1ubuntu1+esm1 | bionic | ||
Affected | pkg:deb/ubuntu/nghttp2-proxy?distro=xenial | ubuntu | nghttp2-proxy | < 1.7.1-1ubuntu0.1~esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nghttp2-proxy?distro=focal | ubuntu | nghttp2-proxy | < 1.40.0-1ubuntu0.1 | focal | ||
Affected | pkg:deb/ubuntu/nghttp2-proxy?distro=bionic | ubuntu | nghttp2-proxy | < 1.30.0-1ubuntu1+esm1 | bionic | ||
Affected | pkg:deb/ubuntu/nghttp2-client?distro=xenial | ubuntu | nghttp2-client | < 1.7.1-1ubuntu0.1~esm1 | xenial | ||
Affected | pkg:deb/ubuntu/nghttp2-client?distro=focal | ubuntu | nghttp2-client | < 1.40.0-1ubuntu0.1 | focal | ||
Affected | pkg:deb/ubuntu/nghttp2-client?distro=bionic | ubuntu | nghttp2-client | < 1.30.0-1ubuntu1+esm1 | bionic | ||
Affected | pkg:deb/ubuntu/libnghttp2-doc?distro=xenial | ubuntu | libnghttp2-doc | < 1.7.1-1ubuntu0.1~esm1 | xenial | ||
Affected | pkg:deb/ubuntu/libnghttp2-doc?distro=focal | ubuntu | libnghttp2-doc | < 1.40.0-1ubuntu0.1 | focal | ||
Affected | pkg:deb/ubuntu/libnghttp2-doc?distro=bionic | ubuntu | libnghttp2-doc | < 1.30.0-1ubuntu1+esm1 | bionic | ||
Affected | pkg:deb/ubuntu/libnghttp2-dev?distro=xenial | ubuntu | libnghttp2-dev | < 1.7.1-1ubuntu0.1~esm1 | xenial | ||
Affected | pkg:deb/ubuntu/libnghttp2-dev?distro=focal | ubuntu | libnghttp2-dev | < 1.40.0-1ubuntu0.1 | focal | ||
Affected | pkg:deb/ubuntu/libnghttp2-dev?distro=bionic | ubuntu | libnghttp2-dev | < 1.30.0-1ubuntu1+esm1 | bionic | ||
Affected | pkg:deb/ubuntu/libnghttp2-14?distro=xenial | ubuntu | libnghttp2-14 | < 1.7.1-1ubuntu0.1~esm1 | xenial | ||
Affected | pkg:deb/ubuntu/libnghttp2-14?distro=focal | ubuntu | libnghttp2-14 | < 1.40.0-1ubuntu0.1 | focal | ||
Affected | pkg:deb/ubuntu/libnghttp2-14?distro=bionic | ubuntu | libnghttp2-14 | < 1.30.0-1ubuntu1+esm1 | bionic |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |