vulnerability
Alma Linux: CVE-2023-44487: Important: nghttp2 security update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 2023-10-10 | 2023-10-18 | 2025-04-30 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
2023-10-10
Added
2023-10-18
Modified
2025-04-30
Description
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Solution(s)
alma-upgrade-aspnetcore-runtime-6.0alma-upgrade-aspnetcore-runtime-7.0alma-upgrade-aspnetcore-targeting-pack-6.0alma-upgrade-aspnetcore-targeting-pack-7.0alma-upgrade-delvealma-upgrade-dotnetalma-upgrade-dotnet-apphost-pack-6.0alma-upgrade-dotnet-apphost-pack-7.0alma-upgrade-dotnet-hostalma-upgrade-dotnet-hostfxr-6.0alma-upgrade-dotnet-hostfxr-7.0alma-upgrade-dotnet-runtime-6.0alma-upgrade-dotnet-runtime-7.0alma-upgrade-dotnet-sdk-6.0alma-upgrade-dotnet-sdk-6.0-source-built-artifactsalma-upgrade-dotnet-sdk-7.0alma-upgrade-dotnet-sdk-7.0-source-built-artifactsalma-upgrade-dotnet-targeting-pack-6.0alma-upgrade-dotnet-targeting-pack-7.0alma-upgrade-dotnet-templates-6.0alma-upgrade-dotnet-templates-7.0alma-upgrade-go-toolsetalma-upgrade-golangalma-upgrade-golang-binalma-upgrade-golang-docsalma-upgrade-golang-miscalma-upgrade-golang-racealma-upgrade-golang-srcalma-upgrade-golang-testsalma-upgrade-grafanaalma-upgrade-libnghttp2alma-upgrade-libnghttp2-develalma-upgrade-netstandard-targeting-pack-2.1alma-upgrade-nghttp2alma-upgrade-nginxalma-upgrade-nginx-all-modulesalma-upgrade-nginx-corealma-upgrade-nginx-filesystemalma-upgrade-nginx-mod-develalma-upgrade-nginx-mod-http-image-filteralma-upgrade-nginx-mod-http-perlalma-upgrade-nginx-mod-http-xslt-filteralma-upgrade-nginx-mod-mailalma-upgrade-nginx-mod-streamalma-upgrade-nodejsalma-upgrade-nodejs-develalma-upgrade-nodejs-docsalma-upgrade-nodejs-full-i18nalma-upgrade-nodejs-libsalma-upgrade-nodejs-nodemonalma-upgrade-nodejs-packagingalma-upgrade-nodejs-packaging-bundleralma-upgrade-npmalma-upgrade-tomcatalma-upgrade-tomcat-admin-webappsalma-upgrade-tomcat-docs-webappalma-upgrade-tomcat-el-3.0-apialma-upgrade-tomcat-jsp-2.3-apialma-upgrade-tomcat-libalma-upgrade-tomcat-servlet-4.0-apialma-upgrade-tomcat-webappsalma-upgrade-toolboxalma-upgrade-toolbox-testsalma-upgrade-varnishalma-upgrade-varnish-develalma-upgrade-varnish-docsalma-upgrade-varnish-modules
References
- CVE-2023-44487
- https://attackerkb.com/topics/CVE-2023-44487
- URL-https://errata.almalinux.org/8/ALSA-2023-5709.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5710.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5712.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5713.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5721.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5837.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5850.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5863.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5869.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5928.html
- URL-https://errata.almalinux.org/8/ALSA-2023-5989.html
- URL-https://errata.almalinux.org/8/ALSA-2023-7205.html
- URL-https://errata.almalinux.org/8/ALSA-2024-1444.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5708.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5711.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5738.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5749.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5765.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5838.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5849.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5867.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5924.html
- URL-https://errata.almalinux.org/9/ALSA-2023-5929.html
- URL-https://errata.almalinux.org/9/ALSA-2023-6077.html
- URL-https://errata.almalinux.org/9/ALSA-2023-6120.html
- URL-https://errata.almalinux.org/9/ALSA-2023-6746.html

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.