[CLSA-2023:1697742241] Fix CVE(s): CVE-2023-44487
Type:
security
Severity:
Important
Release date:
2023-10-19 19:04:06 UTC
Description:
* SECURITY UPDATE: The HTTP/2 protocol allows a denial of service because request cancellation can reset many streams quickly - debian/patches/CVE-2023-44487.patch: HTTP/2 - per-iteration stream handling limit. - CVE-2023-44487
Updated packages:
  • nginx_1.10.3-0ubuntu0.16.04.8+tuxcare.els4_all.deb
    sha:4631fe85f7b9239c8c232e467f414e8ce3ef4791
  • nginx-common_1.10.3-0ubuntu0.16.04.8+tuxcare.els4_all.deb
    sha:3fb161a9385bf950e6f225dc4b02e7b6d9293952
  • nginx-core_1.10.3-0ubuntu0.16.04.8+tuxcare.els4_amd64.deb
    sha:c583d64261113d842fbc689d8c090ec98cacd184
  • nginx-doc_1.10.3-0ubuntu0.16.04.8+tuxcare.els4_all.deb
    sha:84b4d6cafb8becccdb832e19cad897c4f9f4317c
  • nginx-extras_1.10.3-0ubuntu0.16.04.8+tuxcare.els4_amd64.deb
    sha:39f0f970a349c11ac5a7de3b5b841635827764a9
  • nginx-full_1.10.3-0ubuntu0.16.04.8+tuxcare.els4_amd64.deb
    sha:a3e8a68946f7bf50205ff86bec37a2877451e4c9
  • nginx-light_1.10.3-0ubuntu0.16.04.8+tuxcare.els4_amd64.deb
    sha:1d1019487fbb48084ea841a0036ede2f04e5c3a2
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.