ELSA-2023-5712

ELSA-2023-5712 - nginx:1.20 security update

Type:SECURITY
Severity:MODERATE
Release Date:2023-10-17

Description


[1:1.20.1-1.0.1.1]
- Resolves: RHEL-12732 - nginx:1.20/nginx: HTTP/2: Multiple HTTP/2 enabled web
servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)


Related CVEs


CVE-2023-44487

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 8 (aarch64) nginx-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.src.rpm18d6a5fcdd5bfabac5cec641e9126c50-ol8_aarch64_appstream
nginx-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.aarch64.rpm1e95bb8e7c6d7890238ba24f59c860da-ol8_aarch64_appstream
nginx-all-modules-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.noarch.rpmec18ffdd2876e7df9df7ed132b2bb984-ol8_aarch64_appstream
nginx-filesystem-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.noarch.rpm12eef718b6ea3d42ad93393a1d28116e-ol8_aarch64_appstream
nginx-mod-devel-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.aarch64.rpm45a512bcae90b4e091225cef841134fa-ol8_aarch64_appstream
nginx-mod-http-image-filter-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.aarch64.rpm3ed1ff5d9246799c5c0488538223bb2c-ol8_aarch64_appstream
nginx-mod-http-perl-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.aarch64.rpm7c31268cbcebedea4bb08d76206e4eb6-ol8_aarch64_appstream
nginx-mod-http-xslt-filter-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.aarch64.rpm74ef6b48eaf24634a9aec76259da00f3-ol8_aarch64_appstream
nginx-mod-mail-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.aarch64.rpm519f3ef53b0c2cfc625dca837ae1c130-ol8_aarch64_appstream
nginx-mod-stream-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.aarch64.rpmc2218d4ae873b91a8a89c35c63b4ca66-ol8_aarch64_appstream
Oracle Linux 8 (x86_64) nginx-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.src.rpm18d6a5fcdd5bfabac5cec641e9126c50-ol8_x86_64_appstream
nginx-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.x86_64.rpm6a8b3133dd52980b33291e49d09f42ed-ol8_x86_64_appstream
nginx-all-modules-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.noarch.rpmec18ffdd2876e7df9df7ed132b2bb984-ol8_x86_64_appstream
nginx-filesystem-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.noarch.rpm12eef718b6ea3d42ad93393a1d28116e-ol8_x86_64_appstream
nginx-mod-devel-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.x86_64.rpma39573b9e9ceaf057560fce456a4fafe-ol8_x86_64_appstream
nginx-mod-http-image-filter-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.x86_64.rpmfc793ec24005d9912be3a9cd28c43088-ol8_x86_64_appstream
nginx-mod-http-perl-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.x86_64.rpm75eb64d86b5c16fc0c4d399ef4fcff44-ol8_x86_64_appstream
nginx-mod-http-xslt-filter-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.x86_64.rpm8dc543a7faacf78c352fc37382c87cf7-ol8_x86_64_appstream
nginx-mod-mail-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.x86_64.rpmfc84f359866eb17a39ed2a4435a2f152-ol8_x86_64_appstream
nginx-mod-stream-1.20.1-1.0.1.module+el8.8.0+21179+be6d61e7.1.x86_64.rpmdc66afcb62af0eb2e11d642e76eb33e5-ol8_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete