U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2023-44487

Change History

Reanalysis by NIST 10/18/2023 1:01:27 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*
     OR
          cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:* versions up to (excluding) 10.5.3
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:* versions up to (excluding) 1.17.6
     *cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:* versions from (including) 1.18.0 up to (excluding) 1.18.3
     *cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:* versions from (including) 1.19.0 up to (excluding) 1.19.1
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:* versions up to (excluding) 4.2.2
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:* versions up to (excluding) 3.4.2
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:* versions up to (excluding) 1.26.0
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:linkerd:linkerd:*:*:*:*:*:*:*:* versions from (including) 2.12.0 up to (including) 2.12.5
     *cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:*:*:*:*
     *cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:*:*:*:*
     *cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:*:*:*:*
     *cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:* versions up to (excluding) 2023-10-11
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*
     *cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*
     *cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:* versions up to (excluding) 2.10.5
     *cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*
     *cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*
     *cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:* versions up to (excluding) 2023-10-10
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
     *cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:* versions from (including) 8.0.0 up to (excluding) 8.1.9
     *cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:* versions from (including) 9.0.0 up to (excluding) 9.2.3
OR
     *cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:* versions up to (excluding) 3.6.1
     *cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:* versions from (including) 8.0.0 up to (excluding) 8.1.9
     *cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:* versions from (including) 9.0.0 up to (excluding) 9.2.3
Changed CPE Configuration
OR
     *cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:* versions up to (excluding) 2.5.7
OR
     *cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:* versions up to (excluding) 2.7.5
Changed CPE Configuration
OR
     *cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.23
     *cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.12
     *cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.23
     *cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.12
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.2.20
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.4 up to (excluding) 17.4.12
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.6 up to (excluding) 17.6.8
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.7 up to (excluding) 17.7.5
     *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* versions up to (excluding) 10.0.14393.6351
     *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* versions up to (excluding) 10.0.14393.6351
     *cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.4974
     *cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19044.3570
     *cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19045.3570
     *cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22000.2538
     *cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22621.2428
     *cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
OR
     *cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.23
     *cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.12
     *cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:* versions from (including) 6.0.0 up to (excluding) 6.0.23
     *cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:* versions from (including) 7.0.0 up to (excluding) 7.0.12
     *cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:* versions up to (excluding) 2023-10-08
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.0 up to (excluding) 17.2.20
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.4 up to (excluding) 17.4.12
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.6 up to (excluding) 17.6.8
     *cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* versions from (including) 17.7 up to (excluding) 17.7.5
     *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* versions up to (excluding) 10.0.14393.6351
     *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* versions up to (excluding) 10.0.14393.6351
     *cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.4974
     *cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19044.3570
     *cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19045.3570
     *cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22000.2538
     *cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22621.2428
     *cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
     *cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
Changed Reference Type
https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/ Third Party Advisory
https://arstechnica.com/security/2023/10/how-ddosers-used-the-http-2-protocol-to-deliver-attacks-of-unprecedented-size/ Press/Media Coverage, Third Party Advisory
Changed Reference Type
https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack Vendor Advisory
https://blog.qualys.com/vulnerabilities-threat-research/2023/10/10/cve-2023-44487-http-2-rapid-reset-attack Press/Media Coverage
Changed Reference Type
https://bugzilla.suse.com/show_bug.cgi?id=1216123 Issue Tracking
https://bugzilla.suse.com/show_bug.cgi?id=1216123 Issue Tracking, Vendor Advisory
Changed Reference Type
https://github.com/advisories/GHSA-qppj-fm5r-hxr3 Issue Tracking, Vendor Advisory
https://github.com/advisories/GHSA-qppj-fm5r-hxr3 Vendor Advisory
Changed Reference Type
https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113 Vendor Advisory
https://github.com/apache/httpd/blob/afcdbeebbff4b0c50ea26cdd16e178c0d1f24152/modules/http2/h2_mplx.c#L1101-L1113 Product
Changed Reference Type
https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487 Issue Tracking, Vendor Advisory
https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487 Vendor Advisory
Changed Reference Type
https://github.com/caddyserver/caddy/releases/tag/v2.7.5 Issue Tracking, Vendor Advisory
https://github.com/caddyserver/caddy/releases/tag/v2.7.5 Release Notes
Changed Reference Type
https://github.com/etcd-io/etcd/issues/16740 Issue Tracking, Vendor Advisory
https://github.com/etcd-io/etcd/issues/16740 Issue Tracking, Patch, Vendor Advisory
Changed Reference Type
https://github.com/kazu-yamamoto/http2/issues/93 Vendor Advisory
https://github.com/kazu-yamamoto/http2/issues/93 Issue Tracking
Changed Reference Type
https://github.com/line/armeria/pull/5232 Issue Tracking, Vendor Advisory
https://github.com/line/armeria/pull/5232 Issue Tracking, Patch, Vendor Advisory
Changed Reference Type
https://github.com/projectcontour/contour/pull/5826 Issue Tracking, Vendor Advisory
https://github.com/projectcontour/contour/pull/5826 Issue Tracking, Patch, Vendor Advisory
Changed Reference Type
https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/ Third Party Advisory
https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/ Vendor Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html Mailing List
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html Mailing List, Third Party Advisory
Changed Reference Type
https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html Mailing List, Third Party Advisory
Changed Reference Type
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/ Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JMEXY22BFG5Q64HQCM5CK2Q7KDKVV4TY/ Mailing List, Third Party Advisory
Changed Reference Type
https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html Third Party Advisory
https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html Mailing List
Changed Reference Type
https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html Vendor Advisory
https://martinthomson.github.io/h2-stream-limits/draft-thomson-httpbis-h2-stream-limits.html Third Party Advisory
Changed Reference Type
https://news.ycombinator.com/item?id=37837043 Third Party Advisory
https://news.ycombinator.com/item?id=37837043 Issue Tracking