UBUNTU-CVE-2023-44487

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2023-44487
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-44487.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-44487
Related
Published
2023-10-10T00:00:00Z
Modified
2024-10-17T08:29:58Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

References

Affected packages

Ubuntu:Pro:14.04:LTS / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.10.15~dfsg1-4
0.10.21~dfsg1-1
0.10.22~dfsg1-2
0.10.23~dfsg1-1
0.10.23~dfsg1-2
0.10.23~dfsg1-3
0.10.24~dfsg1-1
0.10.25~dfsg2-2
0.10.25~dfsg2-2ubuntu1
0.10.25~dfsg2-2ubuntu1.2
0.10.25~dfsg2-2ubuntu1.2+esm1
0.10.25~dfsg2-2ubuntu1.2+esm2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / tomcat8

Package

Name
tomcat8
Purl
pkg:deb/ubuntu/tomcat8?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.0.26-1
8.0.28-1
8.0.30-1
8.0.32-1
8.0.32-1ubuntu1
8.0.32-1ubuntu1.1
8.0.32-1ubuntu1.2
8.0.32-1ubuntu1.3
8.0.32-1ubuntu1.4
8.0.32-1ubuntu1.5
8.0.32-1ubuntu1.6
8.0.32-1ubuntu1.7
8.0.32-1ubuntu1.8
8.0.32-1ubuntu1.9
8.0.32-1ubuntu1.10
8.0.32-1ubuntu1.11
8.0.32-1ubuntu1.13
8.0.32-1ubuntu1.13+esm1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.7.1-1ubuntu0.1~esm2

Affected versions

0.*

0.6.7-1

1.*

1.3.4-2
1.4.0-1
1.4.0-2
1.5.0-2
1.6.0-1
1.7.0-1
1.7.1-1
1.7.1-1ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "libnghttp2-14"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "libnghttp2-14-dbgsym"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "libnghttp2-dev"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "libnghttp2-doc"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "nghttp2"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "nghttp2-client"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "nghttp2-client-dbgsym"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "nghttp2-proxy"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "nghttp2-proxy-dbgsym"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "nghttp2-server"
        },
        {
            "binary_version": "1.7.1-1ubuntu0.1~esm2",
            "binary_name": "nghttp2-server-dbgsym"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.10.25~dfsg2-2ubuntu1

4.*

4.2.2~dfsg-1
4.2.3~dfsg-1
4.2.4~dfsg-1ubuntu1
4.2.4~dfsg-2
4.2.6~dfsg-1ubuntu1
4.2.6~dfsg-1ubuntu4
4.2.6~dfsg-1ubuntu4.1
4.2.6~dfsg-1ubuntu4.2
4.2.6~dfsg-1ubuntu4.2+esm1
4.2.6~dfsg-1ubuntu4.2+esm2
4.2.6~dfsg-1ubuntu4.2+esm3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:16.04:LTS / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/ubuntu/trafficserver?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.3.0-2ubuntu1
5.3.0-2ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / haproxy

Package

Name
haproxy
Purl
pkg:deb/ubuntu/haproxy?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.8-1ubuntu0.13+esm3

Affected versions

1.*

1.7.9-1ubuntu1
1.7.9-1ubuntu2
1.8.4-1
1.8.7-1
1.8.8-1
1.8.8-1ubuntu0.1
1.8.8-1ubuntu0.2
1.8.8-1ubuntu0.3
1.8.8-1ubuntu0.4
1.8.8-1ubuntu0.6
1.8.8-1ubuntu0.7
1.8.8-1ubuntu0.8
1.8.8-1ubuntu0.9
1.8.8-1ubuntu0.10
1.8.8-1ubuntu0.11
1.8.8-1ubuntu0.13
1.8.8-1ubuntu0.13+esm2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1.8.8-1ubuntu0.13+esm3",
            "binary_name": "haproxy"
        },
        {
            "binary_version": "1.8.8-1ubuntu0.13+esm3",
            "binary_name": "haproxy-dbgsym"
        },
        {
            "binary_version": "1.8.8-1ubuntu0.13+esm3",
            "binary_name": "haproxy-doc"
        },
        {
            "binary_version": "1.8.8-1ubuntu0.13+esm3",
            "binary_name": "vim-haproxy"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2?arch=src?distro=esm-infra/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.30.0-1ubuntu1+esm2

Affected versions

1.*

1.25.0-1
1.27.0-1
1.28.0-1
1.29.0-1
1.29.0-1build1
1.30.0-1
1.30.0-1ubuntu1
1.30.0-1ubuntu1+esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "libnghttp2-14"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "libnghttp2-14-dbgsym"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "libnghttp2-dev"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "libnghttp2-doc"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "nghttp2"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "nghttp2-client"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "nghttp2-client-dbgsym"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "nghttp2-proxy"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "nghttp2-proxy-dbgsym"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "nghttp2-server"
        },
        {
            "binary_version": "1.30.0-1ubuntu1+esm2",
            "binary_name": "nghttp2-server-dbgsym"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / h2o

Package

Name
h2o
Purl
pkg:deb/ubuntu/h2o?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.3+dfsg-2
2.2.4+dfsg-1
2.2.4+dfsg-1build1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.11.4~dfsg-1ubuntu1
6.11.4~dfsg-1ubuntu2
6.12.0~dfsg-1ubuntu1
6.12.0~dfsg-2ubuntu1
6.12.0~dfsg-2ubuntu2

8.*

8.10.0~dfsg-2
8.10.0~dfsg-2ubuntu0.2
8.10.0~dfsg-2ubuntu0.3
8.10.0~dfsg-2ubuntu0.4
8.10.0~dfsg-2ubuntu0.4+esm1
8.10.0~dfsg-2ubuntu0.4+esm2
8.10.0~dfsg-2ubuntu0.4+esm3
8.10.0~dfsg-2ubuntu0.4+esm4
8.10.0~dfsg-2ubuntu0.4+esm5

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / tomcat8

Package

Name
tomcat8
Purl
pkg:deb/ubuntu/tomcat8?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.5.21-1ubuntu1
8.5.29-1
8.5.30-1
8.5.30-1ubuntu1
8.5.30-1ubuntu1.2
8.5.30-1ubuntu1.3
8.5.30-1ubuntu1.4
8.5.39-1ubuntu1~18.04.1
8.5.39-1ubuntu1~18.04.2
8.5.39-1ubuntu1~18.04.3
8.5.39-1ubuntu1~18.04.3+esm1
8.5.39-1ubuntu1~18.04.3+esm2
8.5.39-1ubuntu1~18.04.3+esm3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / tomcat9

Package

Name
tomcat9
Purl
pkg:deb/ubuntu/tomcat9?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.16-3~18.04.1
9.0.16-3ubuntu0.18.04.1
9.0.16-3ubuntu0.18.04.2
9.0.16-3ubuntu0.18.04.2+esm1
9.0.16-3ubuntu0.18.04.2+esm2
9.0.16-3ubuntu0.18.04.2+esm3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:Pro:18.04:LTS / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/ubuntu/trafficserver?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

7.*

7.0.0-5
7.1.2+ds-2
7.1.2+ds-2build1
7.1.2+ds-3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / h2o

Package

Name
h2o
Purl
pkg:deb/ubuntu/h2o?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.5+dfsg2-3
2.2.5+dfsg2-3build1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / haproxy

Package

Name
haproxy
Purl
pkg:deb/ubuntu/haproxy?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.31-0ubuntu0.2

Affected versions

2.*

2.0.5-1
2.0.8-1
2.0.9-1
2.0.10-1
2.0.10-1ubuntu1
2.0.11-1ubuntu1
2.0.12-1ubuntu2
2.0.13-1ubuntu2
2.0.13-2
2.0.13-2ubuntu0.1
2.0.13-2ubuntu0.2
2.0.13-2ubuntu0.3
2.0.13-2ubuntu0.5
2.0.29-0ubuntu1
2.0.29-0ubuntu1.1
2.0.29-0ubuntu1.3
2.0.31-0ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "2.0.31-0ubuntu0.2",
            "binary_name": "haproxy"
        },
        {
            "binary_version": "2.0.31-0ubuntu0.2",
            "binary_name": "haproxy-dbgsym"
        },
        {
            "binary_version": "2.0.31-0ubuntu0.2",
            "binary_name": "haproxy-doc"
        },
        {
            "binary_version": "2.0.31-0ubuntu0.2",
            "binary_name": "vim-haproxy"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.40.0-1ubuntu0.2

Affected versions

1.*

1.39.2-1
1.40.0-1
1.40.0-1build1
1.40.0-1ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "libnghttp2-14"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "libnghttp2-14-dbgsym"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "libnghttp2-dev"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "libnghttp2-doc"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "nghttp2"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "nghttp2-client"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "nghttp2-client-dbgsym"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "nghttp2-proxy"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "nghttp2-proxy-dbgsym"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "nghttp2-server"
        },
        {
            "binary_version": "1.40.0-1ubuntu0.2",
            "binary_name": "nghttp2-server-dbgsym"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

10.*

10.15.2~dfsg-2ubuntu1
10.17.0~dfsg-2ubuntu4
10.17.0~dfsg-2ubuntu6
10.19.0~dfsg-3ubuntu1
10.19.0~dfsg-3ubuntu1.1
10.19.0~dfsg-3ubuntu1.2
10.19.0~dfsg-3ubuntu1.3
10.19.0~dfsg-3ubuntu1.5
10.19.0~dfsg-3ubuntu1.6

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / tomcat9

Package

Name
tomcat9
Purl
pkg:deb/ubuntu/tomcat9?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.24-1
9.0.27-1
9.0.31-1
9.0.31-1ubuntu0.1
9.0.31-1ubuntu0.2
9.0.31-1ubuntu0.3
9.0.31-1ubuntu0.4
9.0.31-1ubuntu0.5
9.0.31-1ubuntu0.6
9.0.31-1ubuntu0.7

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:20.04:LTS / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/ubuntu/trafficserver?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.0.5+ds-1
8.0.5+ds-2
8.0.5+ds-2build1
8.0.5+ds-2ubuntu1
8.0.5+ds-3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / dotnet6

Package

Name
dotnet6
Purl
pkg:deb/ubuntu/dotnet6?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.123-0ubuntu1~22.04.1

Affected versions

6.*

6.0.108-0ubuntu1~22.04.1
6.0.109-0ubuntu1~22.04.1
6.0.110-0ubuntu1~22.04.1
6.0.111-0ubuntu1~22.04.1
6.0.113-0ubuntu1~22.04.1
6.0.116-0ubuntu1~22.04.1
6.0.118-0ubuntu1~22.04.1
6.0.119-0ubuntu1~22.04.1
6.0.120-0ubuntu1~22.04.1
6.0.121-0ubuntu1~22.04.1
6.0.122-0ubuntu1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "aspnetcore-runtime-6.0"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "aspnetcore-targeting-pack-6.0"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-apphost-pack-6.0"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-apphost-pack-6.0-dbgsym"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-host"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-host-dbgsym"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-hostfxr-6.0"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-hostfxr-6.0-dbgsym"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-runtime-6.0"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-runtime-6.0-dbgsym"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-sdk-6.0"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-sdk-6.0-dbgsym"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-sdk-6.0-source-built-artifacts"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-targeting-pack-6.0"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet-templates-6.0"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "dotnet6"
        },
        {
            "binary_version": "6.0.123-0ubuntu1~22.04.1",
            "binary_name": "netstandard-targeting-pack-2.1"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / dotnet7

Package

Name
dotnet7
Purl
pkg:deb/ubuntu/dotnet7?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.112-0ubuntu1~22.04.1

Affected versions

7.*

7.0.105-0ubuntu1~22.04.1
7.0.107-0ubuntu1~22.04.1
7.0.108-0ubuntu1~22.04.1
7.0.109-0ubuntu1~22.04.1
7.0.110-0ubuntu1~22.04.1
7.0.111-0ubuntu1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "aspnetcore-runtime-7.0"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "aspnetcore-targeting-pack-7.0"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-apphost-pack-7.0"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-apphost-pack-7.0-dbgsym"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-host-7.0"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-host-7.0-dbgsym"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-hostfxr-7.0"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-hostfxr-7.0-dbgsym"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-runtime-7.0"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-runtime-7.0-dbgsym"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-sdk-7.0"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-sdk-7.0-dbgsym"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-sdk-7.0-source-built-artifacts"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-targeting-pack-7.0"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet-templates-7.0"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "dotnet7"
        },
        {
            "binary_version": "7.0.112-0ubuntu1~22.04.1",
            "binary_name": "netstandard-targeting-pack-2.1-7.0"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / dotnet8

Package

Name
dotnet8
Purl
pkg:deb/ubuntu/dotnet8?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.102-8.0.2-0ubuntu1~22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "aspnetcore-runtime-8.0"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "aspnetcore-targeting-pack-8.0"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet-apphost-pack-8.0"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet-apphost-pack-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet-host-8.0"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet-host-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet-hostfxr-8.0"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet-hostfxr-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet-runtime-8.0"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet-runtime-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.102-0ubuntu1~22.04.1",
            "binary_name": "dotnet-sdk-8.0"
        },
        {
            "binary_version": "8.0.102-0ubuntu1~22.04.1",
            "binary_name": "dotnet-sdk-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.102-0ubuntu1~22.04.1",
            "binary_name": "dotnet-sdk-8.0-source-built-artifacts"
        },
        {
            "binary_version": "8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet-targeting-pack-8.0"
        },
        {
            "binary_version": "8.0.102-0ubuntu1~22.04.1",
            "binary_name": "dotnet-templates-8.0"
        },
        {
            "binary_version": "8.0.102-8.0.2-0ubuntu1~22.04.1",
            "binary_name": "dotnet8"
        },
        {
            "binary_version": "8.0.102-0ubuntu1~22.04.1",
            "binary_name": "netstandard-targeting-pack-2.1-8.0"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / h2o

Package

Name
h2o
Purl
pkg:deb/ubuntu/h2o?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.5+dfsg2-6
2.2.5+dfsg2-6.1
2.2.5+dfsg2-6.1ubuntu1
2.2.5+dfsg2-6.1ubuntu2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / haproxy

Package

Name
haproxy
Purl
pkg:deb/ubuntu/haproxy?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.22-0ubuntu0.22.04.2

Affected versions

2.*

2.2.9-2ubuntu2
2.4.8-1
2.4.8-2ubuntu3
2.4.11-1ubuntu1
2.4.12-1ubuntu1
2.4.12-1ubuntu2
2.4.13-1ubuntu1
2.4.14-1ubuntu1
2.4.18-0ubuntu1
2.4.18-0ubuntu1.1
2.4.18-0ubuntu1.2
2.4.18-0ubuntu1.3
2.4.22-0ubuntu0.22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "2.4.22-0ubuntu0.22.04.2",
            "binary_name": "haproxy"
        },
        {
            "binary_version": "2.4.22-0ubuntu0.22.04.2",
            "binary_name": "haproxy-dbgsym"
        },
        {
            "binary_version": "2.4.22-0ubuntu0.22.04.2",
            "binary_name": "haproxy-doc"
        },
        {
            "binary_version": "2.4.22-0ubuntu0.22.04.2",
            "binary_name": "vim-haproxy"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / netty

Package

Name
netty
Purl
pkg:deb/ubuntu/netty?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.1.48-4+deb11u2build0.22.04.1

Affected versions

1:4.*

1:4.1.48-4
1:4.1.48-4+deb11u1build0.22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1:4.1.48-4+deb11u2build0.22.04.1",
            "binary_name": "libnetty-java"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.43.0-1ubuntu0.1

Affected versions

1.*

1.43.0-1
1.43.0-1build1
1.43.0-1build2
1.43.0-1build3

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "libnghttp2-14"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "libnghttp2-14-dbgsym"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "libnghttp2-dev"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "libnghttp2-doc"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "nghttp2"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "nghttp2-client"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "nghttp2-client-dbgsym"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "nghttp2-proxy"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "nghttp2-proxy-dbgsym"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "nghttp2-server"
        },
        {
            "binary_version": "1.43.0-1ubuntu0.1",
            "binary_name": "nghttp2-server-dbgsym"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

12.*

12.22.5~dfsg-5ubuntu1
12.22.7~dfsg-2ubuntu1
12.22.7~dfsg-2ubuntu3
12.22.9~dfsg-1ubuntu2
12.22.9~dfsg-1ubuntu3
12.22.9~dfsg-1ubuntu3.1
12.22.9~dfsg-1ubuntu3.2
12.22.9~dfsg-1ubuntu3.3
12.22.9~dfsg-1ubuntu3.4
12.22.9~dfsg-1ubuntu3.5
12.22.9~dfsg-1ubuntu3.6

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / tomcat9

Package

Name
tomcat9
Purl
pkg:deb/ubuntu/tomcat9?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.43-3
9.0.54-1
9.0.55-1
9.0.58-1
9.0.58-1ubuntu0.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:22.04:LTS / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/ubuntu/trafficserver?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*

8.1.1+ds-1.1

9.*

9.1.1+ds-2build1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.10 / h2o

Package

Name
h2o
Purl
pkg:deb/ubuntu/h2o?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.2.5+dfsg2-8.1ubuntu3

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.10 / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

18.*

18.19.1+dfsg-6ubuntu5
18.20.1+dfsg-4ubuntu4

20.*

20.13.1+dfsg-2ubuntu6
20.14.0+dfsg-1ubuntu1
20.14.0+dfsg-2ubuntu1
20.14.0+dfsg-3ubuntu1
20.15.0+dfsg-1ubuntu3
20.16.0+dfsg-1ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.10 / tomcat10

Package

Name
tomcat10
Purl
pkg:deb/ubuntu/tomcat10?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
10.1.23-1

Affected versions

10.*

10.1.16-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "10.1.23-1",
            "binary_name": "libtomcat10-embed-java"
        },
        {
            "binary_version": "10.1.23-1",
            "binary_name": "libtomcat10-java"
        },
        {
            "binary_version": "10.1.23-1",
            "binary_name": "tomcat10"
        },
        {
            "binary_version": "10.1.23-1",
            "binary_name": "tomcat10-admin"
        },
        {
            "binary_version": "10.1.23-1",
            "binary_name": "tomcat10-common"
        },
        {
            "binary_version": "10.1.23-1",
            "binary_name": "tomcat10-docs"
        },
        {
            "binary_version": "10.1.23-1",
            "binary_name": "tomcat10-examples"
        },
        {
            "binary_version": "10.1.23-1",
            "binary_name": "tomcat10-user"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.10 / tomcat9

Package

Name
tomcat9
Purl
pkg:deb/ubuntu/tomcat9?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.70-2
9.0.70-2ubuntu1.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.10 / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/ubuntu/trafficserver?arch=src?distro=oracular

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.2.3+ds-1+deb12u1build4
9.2.4+ds-2

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / dotnet8

Package

Name
dotnet8
Purl
pkg:deb/ubuntu/dotnet8?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0.100-8.0.0-0ubuntu1

Affected versions

8.*

8.0.100-8.0.0~rc1-0ubuntu1
8.0.100-8.0.0~rc2-0ubuntu1
8.0.100-8.0.0~rc2-0ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "aspnetcore-runtime-8.0"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "aspnetcore-targeting-pack-8.0"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "dotnet-apphost-pack-8.0"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "dotnet-apphost-pack-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "dotnet-host-8.0"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "dotnet-host-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "dotnet-hostfxr-8.0"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "dotnet-hostfxr-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "dotnet-runtime-8.0"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "dotnet-runtime-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.100-0ubuntu1",
            "binary_name": "dotnet-sdk-8.0"
        },
        {
            "binary_version": "8.0.100-0ubuntu1",
            "binary_name": "dotnet-sdk-8.0-dbgsym"
        },
        {
            "binary_version": "8.0.100-0ubuntu1",
            "binary_name": "dotnet-sdk-8.0-source-built-artifacts"
        },
        {
            "binary_version": "8.0.0-0ubuntu1",
            "binary_name": "dotnet-targeting-pack-8.0"
        },
        {
            "binary_version": "8.0.100-0ubuntu1",
            "binary_name": "dotnet-templates-8.0"
        },
        {
            "binary_version": "8.0.100-8.0.0-0ubuntu1",
            "binary_name": "dotnet8"
        },
        {
            "binary_version": "8.0.100-0ubuntu1",
            "binary_name": "netstandard-targeting-pack-2.1-8.0"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / h2o

Package

Name
h2o
Purl
pkg:deb/ubuntu/h2o?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.5+dfsg2-8

Affected versions

2.*

2.2.5+dfsg2-7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "h2o"
        },
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "h2o-dbgsym"
        },
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "h2o-doc"
        },
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "libh2o-dev"
        },
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "libh2o-dev-common"
        },
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "libh2o-evloop-dev"
        },
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "libh2o-evloop0.13"
        },
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "libh2o-evloop0.13-dbgsym"
        },
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "libh2o0.13"
        },
        {
            "binary_version": "2.2.5+dfsg2-8",
            "binary_name": "libh2o0.13-dbgsym"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / haproxy

Package

Name
haproxy
Purl
pkg:deb/ubuntu/haproxy?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.6.15-1ubuntu2

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "2.6.15-1ubuntu2",
            "binary_name": "haproxy"
        },
        {
            "binary_version": "2.6.15-1ubuntu2",
            "binary_name": "haproxy-dbgsym"
        },
        {
            "binary_version": "2.6.15-1ubuntu2",
            "binary_name": "haproxy-doc"
        },
        {
            "binary_version": "2.6.15-1ubuntu2",
            "binary_name": "vim-haproxy"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / netty

Package

Name
netty
Purl
pkg:deb/ubuntu/netty?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:4.1.48-8

Affected versions

1:4.*

1:4.1.48-7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1:4.1.48-8",
            "binary_name": "libnetty-java"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / nghttp2

Package

Name
nghttp2
Purl
pkg:deb/ubuntu/nghttp2?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.58.0-1

Affected versions

1.*

1.55.1-1
1.57.0-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "1.58.0-1",
            "binary_name": "libnghttp2-14"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "libnghttp2-14-dbgsym"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "libnghttp2-dev"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "libnghttp2-doc"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "nghttp2"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "nghttp2-client"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "nghttp2-client-dbgsym"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "nghttp2-proxy"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "nghttp2-proxy-dbgsym"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "nghttp2-server"
        },
        {
            "binary_version": "1.58.0-1",
            "binary_name": "nghttp2-server-dbgsym"
        }
    ],
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / nodejs

Package

Name
nodejs
Purl
pkg:deb/ubuntu/nodejs?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

18.*

18.13.0+dfsg1-1ubuntu2
18.19.1+dfsg-2ubuntu4
18.19.1+dfsg-6ubuntu1
18.19.1+dfsg-6ubuntu2
18.19.1+dfsg-6ubuntu5

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / tomcat10

Package

Name
tomcat10
Purl
pkg:deb/ubuntu/tomcat10?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

10.*

10.1.10-1
10.1.14-1
10.1.15-1
10.1.16-1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / tomcat9

Package

Name
tomcat9
Purl
pkg:deb/ubuntu/tomcat9?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.0.70-1ubuntu1
9.0.70-2
9.0.70-2ubuntu0.1

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}

Ubuntu:24.04:LTS / trafficserver

Package

Name
trafficserver
Purl
pkg:deb/ubuntu/trafficserver?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

9.*

9.2.1+ds-1build1
9.2.2+ds-1
9.2.3+ds-1
9.2.3+ds-1+deb12u1
9.2.3+ds-1+deb12u1build1
9.2.3+ds-1+deb12u1build3
9.2.3+ds-1+deb12u1build4

Ecosystem specific

{
    "ubuntu_priority": "high",
    "priority_reason": "Listed in CISA Known Exploited Vulnerabilities Catalog"
}