On 29/05/2024 17:22, Igor Ippolitov wrote:
On 29/05/2024 16:52, Daniel Jagszent wrote:
Hello,
the SHA512 of https://nginx.org/download/nginx-1.27.0.tar.gz (downloaded
2024-05-29 15:42:02 UTC) is
251bfe65c717a8027ef05caae2ab2ea73b9b544577f539a1d419fe6adf0bcc846b73b58f54ea3f102df79aaf340e4fa56793
On 29/05/2024 16:52, Daniel Jagszent wrote:
Hello,
the SHA512 of https://nginx.org/download/nginx-1.27.0.tar.gz (downloaded
2024-05-29 15:42:02 UTC) is
251bfe65c717a8027ef05caae2ab2ea73b9b544577f539a1d419fe6adf0bcc846b73b58f54ea3f102df79aaf340e4fa56793ddadea3cd61bcbbe2364ef94bacb
This does not
Hello,
the SHA512 of https://nginx.org/download/nginx-1.27.0.tar.gz (downloaded
2024-05-29 15:42:02 UTC) is
251bfe65c717a8027ef05caae2ab2ea73b9b544577f539a1d419fe6adf0bcc846b73b58f54ea3f102df79aaf340e4fa56793ddadea3cd61bcbbe2364ef94bacb
This does not match with the shasum expected here
https://hg
Hello!
Four security issues were identified in nginx HTTP/3 implementation, which
might allow an attacker that uses a specially crafted QUIC session to cause
a worker process crash (CVE-2024-31079, CVE-2024-32760, CVE-2024-35200),
worker process memory disclosure on systems with MTU larger than 40
Changes with nginx 1.26.129 May 2024
*) Security: when using HTTP/3, processing of a specially crafted QUIC
session might cause a worker process crash, worker process memory
disclosure on systems with MTU larger than 4096 bytes, or might have
Changes with nginx 1.27.029 May 2024
*) Security: when using HTTP/3, processing of a specially crafted QUIC
session might cause a worker process crash, worker process memory
disclosure on systems with MTU larger than 4096 bytes, or might have