vulnerability
Rocky Linux: CVE-2023-44487: nodejs-16 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | Oct 10, 2023 | Mar 5, 2024 | Jan 28, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Oct 10, 2023
Added
Mar 5, 2024
Modified
Jan 28, 2025
Description
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
Solution(s)
rocky-upgrade-aspnetcore-runtime-6.0rocky-upgrade-aspnetcore-targeting-pack-6.0rocky-upgrade-delverocky-upgrade-delve-debuginforocky-upgrade-delve-debugsourcerocky-upgrade-dotnet-apphost-pack-6.0rocky-upgrade-dotnet-apphost-pack-6.0-debuginforocky-upgrade-dotnet-hostfxr-6.0rocky-upgrade-dotnet-hostfxr-6.0-debuginforocky-upgrade-dotnet-runtime-6.0rocky-upgrade-dotnet-runtime-6.0-debuginforocky-upgrade-dotnet-sdk-6.0rocky-upgrade-dotnet-sdk-6.0-debuginforocky-upgrade-dotnet-sdk-6.0-source-built-artifactsrocky-upgrade-dotnet-targeting-pack-6.0rocky-upgrade-dotnet-templates-6.0rocky-upgrade-go-toolsetrocky-upgrade-golangrocky-upgrade-golang-binrocky-upgrade-golang-racerocky-upgrade-grafanarocky-upgrade-grafana-debuginforocky-upgrade-libdb-cxxrocky-upgrade-libdb-cxx-debuginforocky-upgrade-libdb-debuginforocky-upgrade-libdb-debugsourcerocky-upgrade-libdb-sql-debuginforocky-upgrade-libdb-sql-devel-debuginforocky-upgrade-libdb-utils-debuginforocky-upgrade-libnghttp2rocky-upgrade-libnghttp2-debuginforocky-upgrade-libnghttp2-develrocky-upgrade-nghttp2rocky-upgrade-nghttp2-debuginforocky-upgrade-nghttp2-debugsourcerocky-upgrade-nginxrocky-upgrade-nginx-corerocky-upgrade-nginx-core-debuginforocky-upgrade-nginx-debuginforocky-upgrade-nginx-debugsourcerocky-upgrade-nginx-mod-develrocky-upgrade-nginx-mod-http-image-filterrocky-upgrade-nginx-mod-http-image-filter-debuginforocky-upgrade-nginx-mod-http-perlrocky-upgrade-nginx-mod-http-perl-debuginforocky-upgrade-nginx-mod-http-xslt-filterrocky-upgrade-nginx-mod-http-xslt-filter-debuginforocky-upgrade-nginx-mod-mailrocky-upgrade-nginx-mod-mail-debuginforocky-upgrade-nginx-mod-streamrocky-upgrade-nginx-mod-stream-debuginforocky-upgrade-nodejsrocky-upgrade-nodejs-debuginforocky-upgrade-nodejs-debugsourcerocky-upgrade-nodejs-develrocky-upgrade-nodejs-full-i18nrocky-upgrade-nodejs-libsrocky-upgrade-nodejs-libs-debuginforocky-upgrade-npmrocky-upgrade-varnishrocky-upgrade-varnish-develrocky-upgrade-varnish-docsrocky-upgrade-varnish-modulesrocky-upgrade-varnish-modules-debuginforocky-upgrade-varnish-modules-debugsource
References
- CVE-2023-44487
- https://attackerkb.com/topics/CVE-2023-44487
- URL-https://errata.rockylinux.org/RLSA-2023:5708
- URL-https://errata.rockylinux.org/RLSA-2023:5721
- URL-https://errata.rockylinux.org/RLSA-2023:5738
- URL-https://errata.rockylinux.org/RLSA-2023:5749
- URL-https://errata.rockylinux.org/RLSA-2023:5765
- URL-https://errata.rockylinux.org/RLSA-2023:5838
- URL-https://errata.rockylinux.org/RLSA-2023:5850
- URL-https://errata.rockylinux.org/RLSA-2023:5863
- URL-https://errata.rockylinux.org/RLSA-2023:5924
- URL-https://errata.rockylinux.org/RLSA-2023:5928
- URL-https://errata.rockylinux.org/RLSA-2023:5989
- URL-https://errata.rockylinux.org/RLSA-2023:6077
- URL-https://errata.rockylinux.org/RLSA-2023:6120
- URL-https://errata.rockylinux.org/RLSA-2023:6746
- URL-https://errata.rockylinux.org/RLSA-2023:6818
- URL-https://errata.rockylinux.org/RLSA-2023:7205
- URL-https://errata.rockylinux.org/RLSA-2024:1444

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.