[USN-6505-1] nghttp2 vulnerability
Severity
High
Affected Packages
28
CVEs
1
nghttp2 could be made to consume resources if it received specially crafted network traffic.
It was discovered that nghttp2 incorrectly handled request cancellation. A
remote attacker could possibly use this issue to cause nghttp2 to consume
resources, leading to a denial of service.
- ID
- USN-6505-1
- Severity
- high
- Severity from
- CVE-2023-44487
- URL
- https://ubuntu.com/security/notices/USN-6505-1
- Published
-
2023-11-22T14:45:49
(10 months ago) - Modified
-
2023-11-22T14:45:49
(10 months ago) - Other Advisories
-
- ALAS-2023-1868
- ALAS-2023-1869
- ALAS-2023-1870
- ALAS-2023-1871
- ALAS2-2023-2312
- ALAS2-2023-2313
- ALPINE:CVE-2023-44487
- ALSA-2023:5708
- ALSA-2023:5709
- ALSA-2023:5710
- ALSA-2023:5711
- ALSA-2023:5712
- ALSA-2023:5713
- ALSA-2023:5721
- ALSA-2023:5738
- ALSA-2023:5749
- ALSA-2023:5765
- ALSA-2023:5837
- ALSA-2023:5838
- ALSA-2023:5849
- ALSA-2023:5850
- ALSA-2023:5863
- ALSA-2023:5867
- ALSA-2023:5869
- ALSA-2023:5924
- ALSA-2023:5928
- ALSA-2023:5929
- ALSA-2023:5989
- ALSA-2023:6077
- ALSA-2023:6120
- ALSA-2023:6746
- ALSA-2023:7205
- ALSA-2024:1444
- CISA-2023:1010
- CISCO-SA-HTTP2-RESET-D8KF32VZ
- DSA-5521-1
- DSA-5522-1
- DSA-5540-1
- DSA-5549-1
- DSA-5558-1
- DSA-5570-1
- ELSA-2023-13028
- ELSA-2023-13029
- ELSA-2023-13053
- ELSA-2023-13054
- ELSA-2023-5708
- ELSA-2023-5709
- ELSA-2023-5710
- ELSA-2023-5711
- ELSA-2023-5712
- ELSA-2023-5713
- ELSA-2023-5721
- ELSA-2023-5738
- ELSA-2023-5749
- ELSA-2023-5765
- ELSA-2023-5837
- ELSA-2023-5838
- ELSA-2023-5849
- ELSA-2023-5850
- ELSA-2023-5863
- ELSA-2023-5867
- ELSA-2023-5869
- ELSA-2023-5924
- ELSA-2023-5928
- ELSA-2023-5929
- ELSA-2023-5989
- ELSA-2023-6120
- ELSA-2023-6746
- ELSA-2023-7205
- ELSA-2024-1444
- FEDORA-2023-0259c3f26f
- FEDORA-2023-17efd3f2cd
- FEDORA-2023-1caffb88af
- FEDORA-2023-2a9214af5f
- FEDORA-2023-3f70b8d406
- FEDORA-2023-492b7be466
- FEDORA-2023-4bf641255e
- FEDORA-2023-4d2fd884ea
- FEDORA-2023-54fadada12
- FEDORA-2023-5ff7bf1dd8
- FEDORA-2023-7934802344
- FEDORA-2023-7b52921cae
- FEDORA-2023-822aab0a5a
- FEDORA-2023-b2c50535cb
- FEDORA-2023-c0c6a91330
- FEDORA-2023-d5030c983c
- FEDORA-2023-dbe64661af
- FEDORA-2023-e9c04d81c1
- FEDORA-2023-ed2642fd58
- FEDORA-2023-f66fc0f62a
- FEDORA-2023-fe53e13b5b
- FREEBSD:1EE26D45-6DDB-11EE-9898-00E081B7AA2D
- FREEBSD:7A1B2624-6A89-11EE-AF06-5404A68AD561
- FREEBSD:BF545001-B96D-42E4-9D2E-60FDEE204A43
- FREEBSD:F25A34B1-910D-11EE-A1A2-641C67A117D8
- GLSA-202311-09
- GLSA-202408-10
- JENKINS:SECURITY-3291
- MAVEN:GHSA-QPPJ-FM5R-HXR3
- MS:CVE-2023-44487
- openSUSE-SU-2023:0360-1
- RHEA-2023:6562
- RHEA-2023:6741
- RHSA-2023:5708
- RHSA-2023:5709
- RHSA-2023:5710
- RHSA-2023:5711
- RHSA-2023:5712
- RHSA-2023:5713
- RHSA-2023:5721
- RHSA-2023:5738
- RHSA-2023:5749
- RHSA-2023:5765
- RHSA-2023:5835
- RHSA-2023:5837
- RHSA-2023:5838
- RHSA-2023:5849
- RHSA-2023:5850
- RHSA-2023:5863
- RHSA-2023:5867
- RHSA-2023:5869
- RHSA-2023:5924
- RHSA-2023:5928
- RHSA-2023:5929
- RHSA-2023:5989
- RHSA-2023:6077
- RHSA-2023:6120
- RHSA-2023:6746
- RHSA-2023:7205
- RHSA-2024:1444
- RLSA-2023:5708
- RLSA-2023:5749
- RLSA-2023:5765
- RLSA-2023:5838
- RLSA-2023:5863
- RLSA-2023:5924
- RLSA-2023:5928
- RLSA-2023:6077
- SSA:2023-284-02
- SUSE-SU-2023:4068-1
- SUSE-SU-2023:4069-1
- SUSE-SU-2023:4129-1
- SUSE-SU-2023:4132-1
- SUSE-SU-2023:4133-1
- SUSE-SU-2023:4150-1
- SUSE-SU-2023:4155-1
- SUSE-SU-2023:4163-1
- SUSE-SU-2023:4199-1
- SUSE-SU-2023:4200-1
- SUSE-SU-2023:4207-1
- SUSE-SU-2023:4210-1
- SUSE-SU-2023:4259-1
- SUSE-SU-2023:4295-1
- SUSE-SU-2023:4373-1
- SUSE-SU-2023:4374-1
- SUSE-SU-2023:4469-1
- SUSE-SU-2023:4472-1
- SUSE-SU-2023:4492-1
- SUSE-SU-2023:4624-1
- SUSE-SU-2024:0573-1
- SUSE-SU-2024:3094-1
- SUSE-SU-2024:3097-1
- SUSE-SU-2024:3098-1
- TOMCAT:CVE-2023-44487
- USN-6427-1
- USN-6427-2
- USN-6438-1
- USN-6574-1
- USN-6754-1
- USN-6994-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/nghttp2?distro=mantic | ubuntu | nghttp2 | < 1.55.1-1ubuntu0.1 | mantic | ||
Affected | pkg:deb/ubuntu/nghttp2?distro=lunar | ubuntu | nghttp2 | < 1.52.0-1ubuntu0.1 | lunar | ||
Affected | pkg:deb/ubuntu/nghttp2?distro=jammy | ubuntu | nghttp2 | < 1.43.0-1ubuntu0.1 | jammy | ||
Affected | pkg:deb/ubuntu/nghttp2?distro=focal | ubuntu | nghttp2 | < 1.40.0-1ubuntu0.2 | focal | ||
Affected | pkg:deb/ubuntu/nghttp2-server?distro=mantic | ubuntu | nghttp2-server | < 1.55.1-1ubuntu0.1 | mantic | ||
Affected | pkg:deb/ubuntu/nghttp2-server?distro=lunar | ubuntu | nghttp2-server | < 1.52.0-1ubuntu0.1 | lunar | ||
Affected | pkg:deb/ubuntu/nghttp2-server?distro=jammy | ubuntu | nghttp2-server | < 1.43.0-1ubuntu0.1 | jammy | ||
Affected | pkg:deb/ubuntu/nghttp2-server?distro=focal | ubuntu | nghttp2-server | < 1.40.0-1ubuntu0.2 | focal | ||
Affected | pkg:deb/ubuntu/nghttp2-proxy?distro=mantic | ubuntu | nghttp2-proxy | < 1.55.1-1ubuntu0.1 | mantic | ||
Affected | pkg:deb/ubuntu/nghttp2-proxy?distro=lunar | ubuntu | nghttp2-proxy | < 1.52.0-1ubuntu0.1 | lunar | ||
Affected | pkg:deb/ubuntu/nghttp2-proxy?distro=jammy | ubuntu | nghttp2-proxy | < 1.43.0-1ubuntu0.1 | jammy | ||
Affected | pkg:deb/ubuntu/nghttp2-proxy?distro=focal | ubuntu | nghttp2-proxy | < 1.40.0-1ubuntu0.2 | focal | ||
Affected | pkg:deb/ubuntu/nghttp2-client?distro=mantic | ubuntu | nghttp2-client | < 1.55.1-1ubuntu0.1 | mantic | ||
Affected | pkg:deb/ubuntu/nghttp2-client?distro=lunar | ubuntu | nghttp2-client | < 1.52.0-1ubuntu0.1 | lunar | ||
Affected | pkg:deb/ubuntu/nghttp2-client?distro=jammy | ubuntu | nghttp2-client | < 1.43.0-1ubuntu0.1 | jammy | ||
Affected | pkg:deb/ubuntu/nghttp2-client?distro=focal | ubuntu | nghttp2-client | < 1.40.0-1ubuntu0.2 | focal | ||
Affected | pkg:deb/ubuntu/libnghttp2-doc?distro=mantic | ubuntu | libnghttp2-doc | < 1.55.1-1ubuntu0.1 | mantic | ||
Affected | pkg:deb/ubuntu/libnghttp2-doc?distro=lunar | ubuntu | libnghttp2-doc | < 1.52.0-1ubuntu0.1 | lunar | ||
Affected | pkg:deb/ubuntu/libnghttp2-doc?distro=jammy | ubuntu | libnghttp2-doc | < 1.43.0-1ubuntu0.1 | jammy | ||
Affected | pkg:deb/ubuntu/libnghttp2-doc?distro=focal | ubuntu | libnghttp2-doc | < 1.40.0-1ubuntu0.2 | focal | ||
Affected | pkg:deb/ubuntu/libnghttp2-dev?distro=mantic | ubuntu | libnghttp2-dev | < 1.55.1-1ubuntu0.1 | mantic | ||
Affected | pkg:deb/ubuntu/libnghttp2-dev?distro=lunar | ubuntu | libnghttp2-dev | < 1.52.0-1ubuntu0.1 | lunar | ||
Affected | pkg:deb/ubuntu/libnghttp2-dev?distro=jammy | ubuntu | libnghttp2-dev | < 1.43.0-1ubuntu0.1 | jammy | ||
Affected | pkg:deb/ubuntu/libnghttp2-dev?distro=focal | ubuntu | libnghttp2-dev | < 1.40.0-1ubuntu0.2 | focal | ||
Affected | pkg:deb/ubuntu/libnghttp2-14?distro=mantic | ubuntu | libnghttp2-14 | < 1.55.1-1ubuntu0.1 | mantic | ||
Affected | pkg:deb/ubuntu/libnghttp2-14?distro=lunar | ubuntu | libnghttp2-14 | < 1.52.0-1ubuntu0.1 | lunar | ||
Affected | pkg:deb/ubuntu/libnghttp2-14?distro=jammy | ubuntu | libnghttp2-14 | < 1.43.0-1ubuntu0.1 | jammy | ||
Affected | pkg:deb/ubuntu/libnghttp2-14?distro=focal | ubuntu | libnghttp2-14 | < 1.40.0-1ubuntu0.2 | focal |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |