Search for packages
| purl | pkg:deb/debian/nghttp2@1.68.1-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-17k5-vadp-4kby | nghttp2: overly large SETTINGS frames can lead to DoS |
CVE-2020-11080
|
| VCID-5781-s1ny-q7ey |
CVE-2023-44487
GHSA-2m7v-gc89-fjqf GHSA-qppj-fm5r-hxr3 GHSA-vx74-f528-fxqg GHSA-xpw8-rcwv-8f8p GMS-2023-3377 VSV00013 |
|
| VCID-94sx-qnsn-5ucm | Multiple vulnerabilities have been discovered in nghttp2, the worst of which could lead to a denial of service. |
CVE-2024-28182
|
| VCID-9hzg-r1fj-pubf | Excessive CPU usage in HTTP/2 with priority changes |
CVE-2019-9513
|
| VCID-d26w-y23c-q7d1 | Nghttp2 is vulnerable to a heap-use-after-free flaw in idle stream handling code. |
CVE-2015-8659
|
| VCID-dmv4-ydq9-a7eq | Excessive CPU usage in HTTP/2 with small window updates |
CVE-2019-9511
|
| VCID-gbnt-abha-47eu | Nghttp2 is vulnerable to a Denial of Service attack. |
CVE-2016-1544
|
| VCID-gcuf-2uct-ykcu | nghttp2: Null pointer dereference when too large ALTSVC frame is received |
CVE-2018-1000168
|
| VCID-gv39-q6pw-yfh4 | nghttp2: nghttp2: Denial of Service via malformed HTTP/2 frames after session termination |
CVE-2026-27135
|