<menuitem id="lvxh5"><dl id="lvxh5"></dl></menuitem>
<ins id="lvxh5"></ins>
<ins id="lvxh5"></ins><ins id="lvxh5"><span id="lvxh5"><cite id="lvxh5"></cite></span></ins><ins id="lvxh5"><noframes id="lvxh5"><cite id="lvxh5"></cite><del id="lvxh5"><noframes id="lvxh5">
<ins id="lvxh5"></ins>
<ins id="lvxh5"><noframes id="lvxh5"><cite id="lvxh5"></cite>
<del id="lvxh5"><noframes id="lvxh5"><ins id="lvxh5"></ins>
<ins id="lvxh5"></ins>
NGINX.COM

NGINX is now part of F5. See why we’re?better together.

NGINX Updates Mitigate the August 2019 HTTP/2 Vulnerabilities

Today we are releasing updates to NGINX Open Source and NGINX Plus in response to the recent discovery of vulnerabilities in many implementations of HTTP/2. We strongly recommend upgrading all systems that have HTTP/2 enabled.

In May 2019, researchers at Netflix discovered a number of security vulnerabilities in several HTTP/2 server implementations. These were responsibly reported to each of the vendors and maintainers concerned. NGINX was vulnerable to three attack vectors, as detailed in the following CVEs:

We have addressed these vulnerabilities, and added other HTTP/2 security safeguards, in the following NGINX versions:

  • NGINX 1.16.1 (stable)
  • NGINX 1.17.3 (mainline)
  • NGINX Plus R18 P1
Cover image
Microservices: From Design to Deployment

The complete guide to microservices development

?

Tags

No More Tags to display
一级午夜不福利免