Hi folks!
OpenResty 1.15.8.2 is a patch release addressing security
vulnerabilities in the HTTP/2 protocol which may cause excessive
memory consumption and CPU usage (CVE-2019-9511, CVE-2019-9513,
CVE-2019-9516).
All previous NGINX cores supporting HTTP/2 are affected by this
issue (1.9.5 to 1.16
I am using ngx_stream with ssl_preread_module. The $ssl_preread_server_name
variable is used in the proxy_pass directive. Nginx is behind NLB in AWS and
receives v2 of the protocol with Amazon's own extension - PP2_TYPE_AWS -
https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-bala