ELSA-2023-5711

ELSA-2023-5711 - nginx security update

Type:SECURITY
Severity:MODERATE
Release Date:2023-10-17

Description


[1:1.20.1-14.0.1.1]
- Resolves: RHEL-12518 - nginx: HTTP/2: Multiple HTTP/2 enabled web servers are
vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)


Related CVEs


CVE-2023-44487

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By AdvisoryChannel Label
Oracle Linux 9 (aarch64) nginx-1.20.1-14.0.1.el9_2.1.src.rpm9e9aad438c5376422d9fbd754321717a-ol9_aarch64_appstream
nginx-1.20.1-14.0.1.el9_2.1.src.rpm9e9aad438c5376422d9fbd754321717a-ol9_aarch64_codeready_builder
nginx-1.20.1-14.0.1.el9_2.1.aarch64.rpm0999d36f5275f7ff38661ec3465c82c4-ol9_aarch64_appstream
nginx-all-modules-1.20.1-14.0.1.el9_2.1.noarch.rpm8eb12a778b7cee3a4de4cb2d8e1eb130-ol9_aarch64_appstream
nginx-core-1.20.1-14.0.1.el9_2.1.aarch64.rpm1a300f0ce3bae0914e5a5255df388c98-ol9_aarch64_appstream
nginx-filesystem-1.20.1-14.0.1.el9_2.1.noarch.rpm4e38aa38feeb28c4528429ad258d1bb2-ol9_aarch64_appstream
nginx-mod-devel-1.20.1-14.0.1.el9_2.1.aarch64.rpm7be5ebb6f246f1203082f8deba1b91cd-ol9_aarch64_codeready_builder
nginx-mod-http-image-filter-1.20.1-14.0.1.el9_2.1.aarch64.rpmda04f7439878c1cf66f78abd4715a6a4-ol9_aarch64_appstream
nginx-mod-http-perl-1.20.1-14.0.1.el9_2.1.aarch64.rpmf31d2bcd3db31f08da1932b7644dcdd0-ol9_aarch64_appstream
nginx-mod-http-xslt-filter-1.20.1-14.0.1.el9_2.1.aarch64.rpm79806d28ef545471f111cc06b4f10939-ol9_aarch64_appstream
nginx-mod-mail-1.20.1-14.0.1.el9_2.1.aarch64.rpmc29ae296c660e1c870d1f90dc50e2482-ol9_aarch64_appstream
nginx-mod-stream-1.20.1-14.0.1.el9_2.1.aarch64.rpmcf684aa10871afc5448ace8109364c95-ol9_aarch64_appstream
Oracle Linux 9 (x86_64) nginx-1.20.1-14.0.1.el9_2.1.src.rpm9e9aad438c5376422d9fbd754321717a-ol9_x86_64_appstream
nginx-1.20.1-14.0.1.el9_2.1.src.rpm9e9aad438c5376422d9fbd754321717a-ol9_x86_64_codeready_builder
nginx-1.20.1-14.0.1.el9_2.1.x86_64.rpm109d7f28b3f48b9c83e68b383d9605a7-ol9_x86_64_appstream
nginx-all-modules-1.20.1-14.0.1.el9_2.1.noarch.rpm8eb12a778b7cee3a4de4cb2d8e1eb130-ol9_x86_64_appstream
nginx-core-1.20.1-14.0.1.el9_2.1.x86_64.rpm08fe976b1e217f4114c81100943bc2fe-ol9_x86_64_appstream
nginx-filesystem-1.20.1-14.0.1.el9_2.1.noarch.rpm4e38aa38feeb28c4528429ad258d1bb2-ol9_x86_64_appstream
nginx-mod-devel-1.20.1-14.0.1.el9_2.1.x86_64.rpm8284da492616188ff713ebbcd4651a9d-ol9_x86_64_codeready_builder
nginx-mod-http-image-filter-1.20.1-14.0.1.el9_2.1.x86_64.rpmd043499d9d3bcdb654abe6f1393bedff-ol9_x86_64_appstream
nginx-mod-http-perl-1.20.1-14.0.1.el9_2.1.x86_64.rpmbce5f5b83708e19196874bdd2c8c0359-ol9_x86_64_appstream
nginx-mod-http-xslt-filter-1.20.1-14.0.1.el9_2.1.x86_64.rpm392377408ce8166a924f346e7c56c336-ol9_x86_64_appstream
nginx-mod-mail-1.20.1-14.0.1.el9_2.1.x86_64.rpm2ca34b5b526a3c3d17490d91149520ea-ol9_x86_64_appstream
nginx-mod-stream-1.20.1-14.0.1.el9_2.1.x86_64.rpmb8c723b22739794b74c9c1aa8b74b35c-ol9_x86_64_appstream



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete