UBUNTU-CVE-2023-44487

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2023-44487
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-44487.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-44487
Related
Published
2023-10-10T00:00:00Z
Modified
2023-10-10T00:00:00Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

References

Affected packages

Ubuntu:Pro:14.04:LTS / golang-1.10

Package

Name
golang-1.10

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.10.4-2ubuntu1~14.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:14.04:LTS / nodejs

Package

Name
nodejs

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.10.15~dfsg1-4
0.10.21~dfsg1-1
0.10.22~dfsg1-2
0.10.23~dfsg1-1
0.10.23~dfsg1-2
0.10.23~dfsg1-3
0.10.24~dfsg1-1
0.10.25~dfsg2-2
0.10.25~dfsg2-2ubuntu1
0.10.25~dfsg2-2ubuntu1.2
0.10.25~dfsg2-2ubuntu1.2+esm1
0.10.25~dfsg2-2ubuntu1.2+esm2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / golang-1.10

Package

Name
golang-1.10

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.10.4-2ubuntu1~16.04.1
1.10.4-2ubuntu1~16.04.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / golang-1.6

Package

Name
golang-1.6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.6-0ubuntu1
1.6-0ubuntu2
1.6-0ubuntu3
1.6-0ubuntu4
1.6-0ubuntu5
1.6.1-0ubuntu1
1.6.2-0ubuntu5~16.04
1.6.2-0ubuntu5~16.04.2
1.6.2-0ubuntu5~16.04.3
1.6.2-0ubuntu5~16.04.4

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / tomcat8

Package

Name
tomcat8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.0.26-1
8.0.28-1
8.0.30-1
8.0.32-1
8.0.32-1ubuntu1
8.0.32-1ubuntu1.1
8.0.32-1ubuntu1.2
8.0.32-1ubuntu1.3
8.0.32-1ubuntu1.4
8.0.32-1ubuntu1.5
8.0.32-1ubuntu1.6
8.0.32-1ubuntu1.7
8.0.32-1ubuntu1.8
8.0.32-1ubuntu1.9
8.0.32-1ubuntu1.10
8.0.32-1ubuntu1.11
8.0.32-1ubuntu1.13
8.0.32-1ubuntu1.13+esm1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / golang-1.13

Package

Name
golang-1.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.13.8-1ubuntu1~16.04.2
1.13.8-1ubuntu1~16.04.3
1.13.8-1ubuntu1~16.04.3+esm2
1.13.8-1ubuntu1~16.04.3+esm3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / golang-1.18

Package

Name
golang-1.18

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.18.1-1ubuntu1~16.04.6

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.7.1-1ubuntu0.1~esm2?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.1-1ubuntu0.1~esm2

Affected versions

0.*

0.6.7-1

1.*

1.3.4-2
1.4.0-1
1.4.0-2
1.5.0-2
1.6.0-1
1.7.0-1
1.7.1-1
1.7.1-1ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "libnghttp2-14-dbgsym": "1.7.1-1ubuntu0.1~esm2",
            "nghttp2": "1.7.1-1ubuntu0.1~esm2",
            "libnghttp2-14": "1.7.1-1ubuntu0.1~esm2",
            "libnghttp2-dev": "1.7.1-1ubuntu0.1~esm2",
            "nghttp2-client-dbgsym": "1.7.1-1ubuntu0.1~esm2",
            "libnghttp2-doc": "1.7.1-1ubuntu0.1~esm2",
            "nghttp2-proxy": "1.7.1-1ubuntu0.1~esm2",
            "nghttp2-server": "1.7.1-1ubuntu0.1~esm2",
            "nghttp2-client": "1.7.1-1ubuntu0.1~esm2",
            "nghttp2-server-dbgsym": "1.7.1-1ubuntu0.1~esm2",
            "nghttp2-proxy-dbgsym": "1.7.1-1ubuntu0.1~esm2"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / nodejs

Package

Name
nodejs

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.10.25~dfsg2-2ubuntu1

4.*

4.2.2~dfsg-1
4.2.3~dfsg-1
4.2.4~dfsg-1ubuntu1
4.2.4~dfsg-2
4.2.6~dfsg-1ubuntu1
4.2.6~dfsg-1ubuntu4
4.2.6~dfsg-1ubuntu4.1
4.2.6~dfsg-1ubuntu4.2
4.2.6~dfsg-1ubuntu4.2+esm1
4.2.6~dfsg-1ubuntu4.2+esm2
4.2.6~dfsg-1ubuntu4.2+esm3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / trafficserver

Package

Name
trafficserver

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-2ubuntu1
5.3.0-2ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / golang-1.10

Package

Name
golang-1.10

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.10~rc1-1
1.10~rc1-1ubuntu1
1.10~rc1-2ubuntu1
1.10~rc2-1ubuntu1
1.10-1ubuntu1
1.10.1-1ubuntu2
1.10.4-2ubuntu1~18.04.1
1.10.4-2ubuntu1~18.04.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / haproxy

Package

Name
haproxy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.7.9-1ubuntu1
1.7.9-1ubuntu2
1.8.4-1
1.8.7-1
1.8.8-1
1.8.8-1ubuntu0.1
1.8.8-1ubuntu0.2
1.8.8-1ubuntu0.3
1.8.8-1ubuntu0.4
1.8.8-1ubuntu0.6
1.8.8-1ubuntu0.7
1.8.8-1ubuntu0.8
1.8.8-1ubuntu0.9
1.8.8-1ubuntu0.10
1.8.8-1ubuntu0.11
1.8.8-1ubuntu0.13
1.8.8-1ubuntu0.13+esm2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.30.0-1ubuntu1+esm2?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.30.0-1ubuntu1+esm2

Affected versions

1.*

1.25.0-1
1.27.0-1
1.28.0-1
1.29.0-1
1.29.0-1build1
1.30.0-1
1.30.0-1ubuntu1
1.30.0-1ubuntu1+esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "libnghttp2-14-dbgsym": "1.30.0-1ubuntu1+esm2",
            "nghttp2": "1.30.0-1ubuntu1+esm2",
            "libnghttp2-14": "1.30.0-1ubuntu1+esm2",
            "libnghttp2-dev": "1.30.0-1ubuntu1+esm2",
            "nghttp2-client-dbgsym": "1.30.0-1ubuntu1+esm2",
            "libnghttp2-doc": "1.30.0-1ubuntu1+esm2",
            "nghttp2-proxy": "1.30.0-1ubuntu1+esm2",
            "nghttp2-server": "1.30.0-1ubuntu1+esm2",
            "nghttp2-client": "1.30.0-1ubuntu1+esm2",
            "nghttp2-server-dbgsym": "1.30.0-1ubuntu1+esm2",
            "nghttp2-proxy-dbgsym": "1.30.0-1ubuntu1+esm2"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / golang-1.13

Package

Name
golang-1.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.13.8-1ubuntu1~18.04.2
1.13.8-1ubuntu1~18.04.3
1.13.8-1ubuntu1~18.04.4
1.13.8-1ubuntu1~18.04.4+esm1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / golang-1.16

Package

Name
golang-1.16

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.16.2-0ubuntu1~18.04.2
1.16.2-0ubuntu1~18.04.2+esm1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / golang-1.18

Package

Name
golang-1.18

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.18.1-1ubuntu1~18.04.3
1.18.1-1ubuntu1~18.04.4

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / golang-1.8

Package

Name
golang-1.8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.3-2ubuntu1
1.8.3-2ubuntu1.18.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / golang-1.9

Package

Name
golang-1.9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.9.1-2ubuntu1
1.9.2-1ubuntu1
1.9.2-3ubuntu1
1.9.3-1ubuntu1
1.9.4-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / h2o

Package

Name
h2o

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.3+dfsg-2
2.2.4+dfsg-1
2.2.4+dfsg-1build1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / nodejs

Package

Name
nodejs

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.11.4~dfsg-1ubuntu1
6.11.4~dfsg-1ubuntu2
6.12.0~dfsg-1ubuntu1
6.12.0~dfsg-2ubuntu1
6.12.0~dfsg-2ubuntu2

8.*

8.10.0~dfsg-2
8.10.0~dfsg-2ubuntu0.2
8.10.0~dfsg-2ubuntu0.3
8.10.0~dfsg-2ubuntu0.4
8.10.0~dfsg-2ubuntu0.4+esm1
8.10.0~dfsg-2ubuntu0.4+esm2
8.10.0~dfsg-2ubuntu0.4+esm3
8.10.0~dfsg-2ubuntu0.4+esm4
8.10.0~dfsg-2ubuntu0.4+esm5

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / tomcat8

Package

Name
tomcat8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.5.21-1ubuntu1
8.5.29-1
8.5.30-1
8.5.30-1ubuntu1
8.5.30-1ubuntu1.2
8.5.30-1ubuntu1.3
8.5.30-1ubuntu1.4
8.5.39-1ubuntu1~18.04.1
8.5.39-1ubuntu1~18.04.2
8.5.39-1ubuntu1~18.04.3
8.5.39-1ubuntu1~18.04.3+esm1
8.5.39-1ubuntu1~18.04.3+esm2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / tomcat9

Package

Name
tomcat9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.16-3~18.04.1
9.0.16-3ubuntu0.18.04.1
9.0.16-3ubuntu0.18.04.2
9.0.16-3ubuntu0.18.04.2+esm1
9.0.16-3ubuntu0.18.04.2+esm2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / trafficserver

Package

Name
trafficserver

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*

7.0.0-5
7.1.2+ds-2
7.1.2+ds-2build1
7.1.2+ds-3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / golang-1.13

Package

Name
golang-1.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.13.1-1ubuntu1
1.13.3-1ubuntu1
1.13.4-1ubuntu1
1.13.5-1ubuntu1
1.13.6-1ubuntu1
1.13.6-2ubuntu1
1.13.7-1ubuntu1
1.13.8-1ubuntu1
1.13.8-1ubuntu1.1
1.13.8-1ubuntu1.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / golang-1.14

Package

Name
golang-1.14

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.14~beta1-1
1.14~beta1-2
1.14~rc1-1
1.14-1
1.14.1-1
1.14.2-1
1.14.2-1ubuntu1
1.14.3-2ubuntu2~20.04.1
1.14.3-2ubuntu2~20.04.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / golang-1.16

Package

Name
golang-1.16

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.16.2-0ubuntu1~20.04
1.16.2-0ubuntu1~20.04.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / golang-1.18

Package

Name
golang-1.18

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.18.1-1ubuntu1~20.04.1
1.18.1-1ubuntu1~20.04.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / golang-1.20

Package

Name
golang-1.20
Purl
pkg:deb/ubuntu/golang-1.20@1.20.3-1ubuntu0.1~20.04.1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.3-1ubuntu0.1~20.04.1

Affected versions

1.*

1.20.3-1ubuntu0.1~20.04

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "golang-1.20-src": "1.20.3-1ubuntu0.1~20.04.1",
            "golang-1.20": "1.20.3-1ubuntu0.1~20.04.1",
            "golang-1.20-doc": "1.20.3-1ubuntu0.1~20.04.1",
            "golang-1.20-go": "1.20.3-1ubuntu0.1~20.04.1",
            "golang-1.20-go-dbgsym": "1.20.3-1ubuntu0.1~20.04.1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / golang-1.21

Package

Name
golang-1.21
Purl
pkg:deb/ubuntu/golang-1.21@1.21.1-1~ubuntu20.04.2?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21.1-1~ubuntu20.04.2

Affected versions

1.*

1.21.1-1~ubuntu20.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "golang-1.21-doc": "1.21.1-1~ubuntu20.04.2",
            "golang-1.21": "1.21.1-1~ubuntu20.04.2",
            "golang-1.21-src": "1.21.1-1~ubuntu20.04.2",
            "golang-1.21-go": "1.21.1-1~ubuntu20.04.2"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / h2o

Package

Name
h2o

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.5+dfsg2-3
2.2.5+dfsg2-3build1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / haproxy

Package

Name
haproxy
Purl
pkg:deb/ubuntu/haproxy@2.0.31-0ubuntu0.2?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.31-0ubuntu0.2

Affected versions

2.*

2.0.5-1
2.0.8-1
2.0.9-1
2.0.10-1
2.0.10-1ubuntu1
2.0.11-1ubuntu1
2.0.12-1ubuntu2
2.0.13-1ubuntu2
2.0.13-2
2.0.13-2ubuntu0.1
2.0.13-2ubuntu0.2
2.0.13-2ubuntu0.3
2.0.13-2ubuntu0.5
2.0.29-0ubuntu1
2.0.29-0ubuntu1.1
2.0.29-0ubuntu1.3
2.0.31-0ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "haproxy": "2.0.31-0ubuntu0.2",
            "haproxy-doc": "2.0.31-0ubuntu0.2",
            "vim-haproxy": "2.0.31-0ubuntu0.2",
            "haproxy-dbgsym": "2.0.31-0ubuntu0.2"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.40.0-1ubuntu0.2?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.40.0-1ubuntu0.2

Affected versions

1.*

1.39.2-1
1.40.0-1
1.40.0-1build1
1.40.0-1ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "libnghttp2-14-dbgsym": "1.40.0-1ubuntu0.2",
            "nghttp2": "1.40.0-1ubuntu0.2",
            "libnghttp2-14": "1.40.0-1ubuntu0.2",
            "libnghttp2-dev": "1.40.0-1ubuntu0.2",
            "nghttp2-client-dbgsym": "1.40.0-1ubuntu0.2",
            "libnghttp2-doc": "1.40.0-1ubuntu0.2",
            "nghttp2-proxy": "1.40.0-1ubuntu0.2",
            "nghttp2-server": "1.40.0-1ubuntu0.2",
            "nghttp2-client": "1.40.0-1ubuntu0.2",
            "nghttp2-server-dbgsym": "1.40.0-1ubuntu0.2",
            "nghttp2-proxy-dbgsym": "1.40.0-1ubuntu0.2"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / nodejs

Package

Name
nodejs

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

10.*

10.15.2~dfsg-2ubuntu1
10.17.0~dfsg-2ubuntu4
10.17.0~dfsg-2ubuntu6
10.19.0~dfsg-3ubuntu1
10.19.0~dfsg-3ubuntu1.1
10.19.0~dfsg-3ubuntu1.2
10.19.0~dfsg-3ubuntu1.3
10.19.0~dfsg-3ubuntu1.5
10.19.0~dfsg-3ubuntu1.6

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / tomcat9

Package

Name
tomcat9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.24-1
9.0.27-1
9.0.31-1
9.0.31-1ubuntu0.1
9.0.31-1ubuntu0.2
9.0.31-1ubuntu0.3
9.0.31-1ubuntu0.4
9.0.31-1ubuntu0.5
9.0.31-1ubuntu0.6

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / trafficserver

Package

Name
trafficserver

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.0.5+ds-1
8.0.5+ds-2
8.0.5+ds-2build1
8.0.5+ds-2ubuntu1
8.0.5+ds-3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / dotnet6

Package

Name
dotnet6
Purl
pkg:deb/ubuntu/dotnet6@6.0.123-0ubuntu1~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.123-0ubuntu1~22.04.1

Affected versions

6.*

6.0.108-0ubuntu1~22.04.1
6.0.109-0ubuntu1~22.04.1
6.0.110-0ubuntu1~22.04.1
6.0.111-0ubuntu1~22.04.1
6.0.113-0ubuntu1~22.04.1
6.0.116-0ubuntu1~22.04.1
6.0.118-0ubuntu1~22.04.1
6.0.119-0ubuntu1~22.04.1
6.0.120-0ubuntu1~22.04.1
6.0.121-0ubuntu1~22.04.1
6.0.122-0ubuntu1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "dotnet-host": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-runtime-6.0-dbgsym": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-sdk-6.0-dbgsym": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-sdk-6.0": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-sdk-6.0-source-built-artifacts": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-runtime-6.0": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-host-dbgsym": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-templates-6.0": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-hostfxr-6.0": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-apphost-pack-6.0": "6.0.123-0ubuntu1~22.04.1",
            "aspnetcore-runtime-6.0": "6.0.123-0ubuntu1~22.04.1",
            "netstandard-targeting-pack-2.1": "6.0.123-0ubuntu1~22.04.1",
            "dotnet6": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-apphost-pack-6.0-dbgsym": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-hostfxr-6.0-dbgsym": "6.0.123-0ubuntu1~22.04.1",
            "dotnet-targeting-pack-6.0": "6.0.123-0ubuntu1~22.04.1",
            "aspnetcore-targeting-pack-6.0": "6.0.123-0ubuntu1~22.04.1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / dotnet7

Package

Name
dotnet7
Purl
pkg:deb/ubuntu/dotnet7@7.0.112-0ubuntu1~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.112-0ubuntu1~22.04.1

Affected versions

7.*

7.0.105-0ubuntu1~22.04.1
7.0.107-0ubuntu1~22.04.1
7.0.108-0ubuntu1~22.04.1
7.0.109-0ubuntu1~22.04.1
7.0.110-0ubuntu1~22.04.1
7.0.111-0ubuntu1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "dotnet-host-7.0-dbgsym": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-sdk-7.0": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-sdk-7.0-source-built-artifacts": "7.0.112-0ubuntu1~22.04.1",
            "netstandard-targeting-pack-2.1-7.0": "7.0.112-0ubuntu1~22.04.1",
            "dotnet7": "7.0.112-0ubuntu1~22.04.1",
            "aspnetcore-targeting-pack-7.0": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-runtime-7.0": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-hostfxr-7.0": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-sdk-7.0-dbgsym": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-templates-7.0": "7.0.112-0ubuntu1~22.04.1",
            "aspnetcore-runtime-7.0": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-hostfxr-7.0-dbgsym": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-apphost-pack-7.0": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-host-7.0": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-targeting-pack-7.0": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-apphost-pack-7.0-dbgsym": "7.0.112-0ubuntu1~22.04.1",
            "dotnet-runtime-7.0-dbgsym": "7.0.112-0ubuntu1~22.04.1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / dotnet8

Package

Name
dotnet8
Purl
pkg:deb/ubuntu/dotnet8@8.0.102-8.0.2-0ubuntu1~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.102-8.0.2-0ubuntu1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "dotnet-templates-8.0": "8.0.102-0ubuntu1~22.04.1",
            "dotnet-sdk-8.0": "8.0.102-0ubuntu1~22.04.1",
            "dotnet8": "8.0.102-8.0.2-0ubuntu1~22.04.1",
            "dotnet-hostfxr-8.0": "8.0.2-0ubuntu1~22.04.1",
            "aspnetcore-runtime-8.0": "8.0.2-0ubuntu1~22.04.1",
            "dotnet-sdk-8.0-dbgsym": "8.0.102-0ubuntu1~22.04.1",
            "dotnet-apphost-pack-8.0-dbgsym": "8.0.2-0ubuntu1~22.04.1",
            "dotnet-runtime-8.0": "8.0.2-0ubuntu1~22.04.1",
            "dotnet-host-8.0": "8.0.2-0ubuntu1~22.04.1",
            "dotnet-host-8.0-dbgsym": "8.0.2-0ubuntu1~22.04.1",
            "netstandard-targeting-pack-2.1-8.0": "8.0.102-0ubuntu1~22.04.1",
            "dotnet-apphost-pack-8.0": "8.0.2-0ubuntu1~22.04.1",
            "dotnet-sdk-8.0-source-built-artifacts": "8.0.102-0ubuntu1~22.04.1",
            "dotnet-runtime-8.0-dbgsym": "8.0.2-0ubuntu1~22.04.1",
            "aspnetcore-targeting-pack-8.0": "8.0.2-0ubuntu1~22.04.1",
            "dotnet-targeting-pack-8.0": "8.0.2-0ubuntu1~22.04.1",
            "dotnet-hostfxr-8.0-dbgsym": "8.0.2-0ubuntu1~22.04.1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / golang-1.13

Package

Name
golang-1.13

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.13.8-1ubuntu2
1.13.8-1ubuntu2.22.04.1
1.13.8-1ubuntu2.22.04.2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / golang-1.17

Package

Name
golang-1.17

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.17-1ubuntu2
1.17.3-1ubuntu1
1.17.3-1ubuntu2
1.17.13-3ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / golang-1.18

Package

Name
golang-1.18

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.18~beta1-0ubuntu1
1.18~beta2-1ubuntu1
1.18~beta2-1ubuntu2
1.18~rc1-1ubuntu1
1.18-1ubuntu1
1.18.1-1ubuntu1
1.18.1-1ubuntu1.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / golang-1.20

Package

Name
golang-1.20
Purl
pkg:deb/ubuntu/golang-1.20@1.20.3-1ubuntu0.1~22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.20.3-1ubuntu0.1~22.04.1

Affected versions

1.*

1.20.3-1ubuntu0.1~22.04

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "golang-1.20-src": "1.20.3-1ubuntu0.1~22.04.1",
            "golang-1.20": "1.20.3-1ubuntu0.1~22.04.1",
            "golang-1.20-doc": "1.20.3-1ubuntu0.1~22.04.1",
            "golang-1.20-go": "1.20.3-1ubuntu0.1~22.04.1",
            "golang-1.20-go-dbgsym": "1.20.3-1ubuntu0.1~22.04.1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / golang-1.21

Package

Name
golang-1.21
Purl
pkg:deb/ubuntu/golang-1.21@1.21.1-1~ubuntu22.04.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21.1-1~ubuntu22.04.2

Affected versions

1.*

1.21.1-1~ubuntu22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "golang-1.21-doc": "1.21.1-1~ubuntu22.04.2",
            "golang-1.21": "1.21.1-1~ubuntu22.04.2",
            "golang-1.21-src": "1.21.1-1~ubuntu22.04.2",
            "golang-1.21-go": "1.21.1-1~ubuntu22.04.2"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / h2o

Package

Name
h2o

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.5+dfsg2-6
2.2.5+dfsg2-6.1
2.2.5+dfsg2-6.1ubuntu1
2.2.5+dfsg2-6.1ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / haproxy

Package

Name
haproxy
Purl
pkg:deb/ubuntu/haproxy@2.4.22-0ubuntu0.22.04.2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.22-0ubuntu0.22.04.2

Affected versions

2.*

2.2.9-2ubuntu2
2.4.8-1
2.4.8-2ubuntu3
2.4.11-1ubuntu1
2.4.12-1ubuntu1
2.4.12-1ubuntu2
2.4.13-1ubuntu1
2.4.14-1ubuntu1
2.4.18-0ubuntu1
2.4.18-0ubuntu1.1
2.4.18-0ubuntu1.2
2.4.18-0ubuntu1.3
2.4.22-0ubuntu0.22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "haproxy": "2.4.22-0ubuntu0.22.04.2",
            "haproxy-doc": "2.4.22-0ubuntu0.22.04.2",
            "vim-haproxy": "2.4.22-0ubuntu0.22.04.2",
            "haproxy-dbgsym": "2.4.22-0ubuntu0.22.04.2"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / netty

Package

Name
netty
Purl
pkg:deb/ubuntu/netty@1:4.1.48-4+deb11u2build0.22.04.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.1.48-4+deb11u2build0.22.04.1

Affected versions

1:4.*

1:4.1.48-4
1:4.1.48-4+deb11u1build0.22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "libnetty-java": "1:4.1.48-4+deb11u2build0.22.04.1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.43.0-1ubuntu0.1?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.43.0-1ubuntu0.1

Affected versions

1.*

1.43.0-1
1.43.0-1build1
1.43.0-1build2
1.43.0-1build3

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "libnghttp2-14-dbgsym": "1.43.0-1ubuntu0.1",
            "nghttp2": "1.43.0-1ubuntu0.1",
            "libnghttp2-14": "1.43.0-1ubuntu0.1",
            "libnghttp2-dev": "1.43.0-1ubuntu0.1",
            "nghttp2-client-dbgsym": "1.43.0-1ubuntu0.1",
            "libnghttp2-doc": "1.43.0-1ubuntu0.1",
            "nghttp2-proxy": "1.43.0-1ubuntu0.1",
            "nghttp2-server": "1.43.0-1ubuntu0.1",
            "nghttp2-client": "1.43.0-1ubuntu0.1",
            "nghttp2-server-dbgsym": "1.43.0-1ubuntu0.1",
            "nghttp2-proxy-dbgsym": "1.43.0-1ubuntu0.1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / nodejs

Package

Name
nodejs

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

12.*

12.22.5~dfsg-5ubuntu1
12.22.7~dfsg-2ubuntu1
12.22.7~dfsg-2ubuntu3
12.22.9~dfsg-1ubuntu2
12.22.9~dfsg-1ubuntu3
12.22.9~dfsg-1ubuntu3.1
12.22.9~dfsg-1ubuntu3.2
12.22.9~dfsg-1ubuntu3.3
12.22.9~dfsg-1ubuntu3.4
12.22.9~dfsg-1ubuntu3.5
12.22.9~dfsg-1ubuntu3.6

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / tomcat9

Package

Name
tomcat9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.43-3
9.0.54-1
9.0.55-1
9.0.58-1
9.0.58-1ubuntu0.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / trafficserver

Package

Name
trafficserver

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.1.1+ds-1.1

9.*

9.1.1+ds-2build1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / dotnet8

Package

Name
dotnet8
Purl
pkg:deb/ubuntu/dotnet8@8.0.100-8.0.0-0ubuntu1?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.100-8.0.0-0ubuntu1

Affected versions

8.*

8.0.100-8.0.0~rc1-0ubuntu1
8.0.100-8.0.0~rc2-0ubuntu1
8.0.100-8.0.0~rc2-0ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "dotnet-templates-8.0": "8.0.100-0ubuntu1",
            "dotnet-sdk-8.0": "8.0.100-0ubuntu1",
            "dotnet8": "8.0.100-8.0.0-0ubuntu1",
            "dotnet-hostfxr-8.0": "8.0.0-0ubuntu1",
            "aspnetcore-runtime-8.0": "8.0.0-0ubuntu1",
            "dotnet-sdk-8.0-dbgsym": "8.0.100-0ubuntu1",
            "dotnet-apphost-pack-8.0-dbgsym": "8.0.0-0ubuntu1",
            "dotnet-runtime-8.0": "8.0.0-0ubuntu1",
            "dotnet-host-8.0": "8.0.0-0ubuntu1",
            "dotnet-host-8.0-dbgsym": "8.0.0-0ubuntu1",
            "netstandard-targeting-pack-2.1-8.0": "8.0.100-0ubuntu1",
            "dotnet-apphost-pack-8.0": "8.0.0-0ubuntu1",
            "dotnet-sdk-8.0-source-built-artifacts": "8.0.100-0ubuntu1",
            "dotnet-runtime-8.0-dbgsym": "8.0.0-0ubuntu1",
            "aspnetcore-targeting-pack-8.0": "8.0.0-0ubuntu1",
            "dotnet-targeting-pack-8.0": "8.0.0-0ubuntu1",
            "dotnet-hostfxr-8.0-dbgsym": "8.0.0-0ubuntu1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / golang-1.21

Package

Name
golang-1.21
Purl
pkg:deb/ubuntu/golang-1.21@1.21.5-1?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21.5-1

Affected versions

1.*

1.21.1-1
1.21.3-1
1.21.4-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "golang-1.21-doc": "1.21.5-1",
            "golang-1.21": "1.21.5-1",
            "golang-1.21-src": "1.21.5-1",
            "golang-1.21-go": "1.21.5-1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / h2o

Package

Name
h2o
Purl
pkg:deb/ubuntu/h2o@2.2.5+dfsg2-8?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.5+dfsg2-8

Affected versions

2.*

2.2.5+dfsg2-7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "libh2o-dev": "2.2.5+dfsg2-8",
            "h2o-doc": "2.2.5+dfsg2-8",
            "libh2o0.13-dbgsym": "2.2.5+dfsg2-8",
            "libh2o-evloop0.13-dbgsym": "2.2.5+dfsg2-8",
            "libh2o-dev-common": "2.2.5+dfsg2-8",
            "h2o-dbgsym": "2.2.5+dfsg2-8",
            "libh2o-evloop0.13": "2.2.5+dfsg2-8",
            "libh2o0.13": "2.2.5+dfsg2-8",
            "h2o": "2.2.5+dfsg2-8",
            "libh2o-evloop-dev": "2.2.5+dfsg2-8"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / haproxy

Package

Name
haproxy
Purl
pkg:deb/ubuntu/haproxy@2.6.15-1ubuntu2?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.15-1ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "haproxy": "2.6.15-1ubuntu2",
            "haproxy-doc": "2.6.15-1ubuntu2",
            "vim-haproxy": "2.6.15-1ubuntu2",
            "haproxy-dbgsym": "2.6.15-1ubuntu2"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / netty

Package

Name
netty
Purl
pkg:deb/ubuntu/netty@1:4.1.48-8?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.1.48-8

Affected versions

1:4.*

1:4.1.48-7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "libnetty-java": "1:4.1.48-8"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2@1.58.0-1?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.58.0-1

Affected versions

1.*

1.55.1-1
1.57.0-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "libnghttp2-14-dbgsym": "1.58.0-1",
            "nghttp2": "1.58.0-1",
            "libnghttp2-14": "1.58.0-1",
            "libnghttp2-dev": "1.58.0-1",
            "nghttp2-client-dbgsym": "1.58.0-1",
            "libnghttp2-doc": "1.58.0-1",
            "nghttp2-proxy": "1.58.0-1",
            "nghttp2-server": "1.58.0-1",
            "nghttp2-client": "1.58.0-1",
            "nghttp2-server-dbgsym": "1.58.0-1",
            "nghttp2-proxy-dbgsym": "1.58.0-1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / nodejs

Package

Name
nodejs

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

18.*

18.13.0+dfsg1-1ubuntu2
18.19.1+dfsg-2ubuntu4
18.19.1+dfsg-6ubuntu1
18.19.1+dfsg-6ubuntu2
18.19.1+dfsg-6ubuntu5

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / tomcat10

Package

Name
tomcat10

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

10.*

10.1.10-1
10.1.14-1
10.1.15-1
10.1.16-1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / tomcat9

Package

Name
tomcat9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.70-1ubuntu1
9.0.70-2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / trafficserver

Package

Name
trafficserver

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.2.1+ds-1build1
9.2.2+ds-1
9.2.3+ds-1
9.2.3+ds-1+deb12u1
9.2.3+ds-1+deb12u1build1
9.2.3+ds-1+deb12u1build3
9.2.3+ds-1+deb12u1build4

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}