First published: Thu Aug 15 2019(Updated: )
Jonathan Looney discovered that nginx incorrectly handled the HTTP/2 implementation. A remote attacker could possibly use this issue to consume resources, leading to a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/nginx-common | <1.15.9-0ubuntu1.1 | 1.15.9-0ubuntu1.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/nginx-core | <1.15.9-0ubuntu1.1 | 1.15.9-0ubuntu1.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/nginx-extras | <1.15.9-0ubuntu1.1 | 1.15.9-0ubuntu1.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/nginx-full | <1.15.9-0ubuntu1.1 | 1.15.9-0ubuntu1.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/nginx-light | <1.15.9-0ubuntu1.1 | 1.15.9-0ubuntu1.1 |
Ubuntu OpenSSH Client | =19.04 | |
All of | ||
ubuntu/nginx-common | <1.14.0-0ubuntu1.4 | 1.14.0-0ubuntu1.4 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/nginx-core | <1.14.0-0ubuntu1.4 | 1.14.0-0ubuntu1.4 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/nginx-extras | <1.14.0-0ubuntu1.4 | 1.14.0-0ubuntu1.4 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/nginx-full | <1.14.0-0ubuntu1.4 | 1.14.0-0ubuntu1.4 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/nginx-light | <1.14.0-0ubuntu1.4 | 1.14.0-0ubuntu1.4 |
Ubuntu OpenSSH Client | =18.04 | |
All of | ||
ubuntu/nginx-common | <1.10.3-0ubuntu0.16.04.4 | 1.10.3-0ubuntu0.16.04.4 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/nginx-core | <1.10.3-0ubuntu0.16.04.4 | 1.10.3-0ubuntu0.16.04.4 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/nginx-extras | <1.10.3-0ubuntu0.16.04.4 | 1.10.3-0ubuntu0.16.04.4 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/nginx-full | <1.10.3-0ubuntu0.16.04.4 | 1.10.3-0ubuntu0.16.04.4 |
Ubuntu OpenSSH Client | =16.04 | |
All of | ||
ubuntu/nginx-light | <1.10.3-0ubuntu0.16.04.4 | 1.10.3-0ubuntu0.16.04.4 |
Ubuntu OpenSSH Client | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this nginx vulnerability is CVE-2019-9511.
The severity of CVE-2019-9511 is high.
The vulnerability in nginx could allow a remote attacker to consume resources, leading to a denial of service.
Versions 1.15.9-0ubuntu1.1, 1.14.0-0ubuntu1.4, and 1.10.3-0ubuntu0.16.04.4 of nginx on Ubuntu are affected.
To fix the CVE-2019-9511 vulnerability in nginx, you should upgrade to version 1.15.9-0ubuntu1.1, 1.14.0-0ubuntu1.4, or 1.10.3-0ubuntu0.16.04.4 depending on the Ubuntu version you are using.