wid-sec-w-2023-2618
Vulnerability from csaf_certbund
Published
2023-10-10 22:00
Modified
2024-06-13 22:00
Summary
http/2 Implementierungen: Schwachstelle ermöglicht Denial of Service

Notes

Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
http/2 ist das HyperText Transfer Protocol in Version 2.
Angriff
Ein entfernter, anonymer Angreifer kann eine Schwachstelle in verschiedenen http/2 Implementierungen ausnutzen, um einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux - MacOS X - Sonstiges - UNIX - Windows



{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "http/2 ist das HyperText Transfer Protocol in Version 2.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in verschiedenen http/2 Implementierungen ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2023-2618 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2618.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2023-2618 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2618"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7710 vom 2023-12-11",
        "url": "https://access.redhat.com/errata/RHSA-2023:7710"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-13028 vom 2023-12-08",
        "url": "https://linux.oracle.com/errata/ELSA-2023-13028.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-13029 vom 2023-12-08",
        "url": "https://linux.oracle.com/errata/ELSA-2023-13029.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0306 vom 2024-01-25",
        "url": "https://access.redhat.com/errata/RHSA-2024:0306"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7105533 vom 2024-01-06",
        "url": "https://www.ibm.com/support/pages/node/7105533"
      },
      {
        "category": "external",
        "summary": "DELL Security Update",
        "url": "https://www.dell.com/support/kbdoc/de-de/000221476/dsa-2024-058-security-update-for-dell-networker-vproxy-multiple-components-vulnerabilities"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7682 vom 2023-12-12",
        "url": "https://access.redhat.com/errata/RHSA-2023:7682"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7741 vom 2023-12-12",
        "url": "https://access.redhat.com/errata/RHSA-2023:7741"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7687 vom 2023-12-13",
        "url": "https://access.redhat.com/errata/RHSA-2023:7687"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0741 vom 2024-02-14",
        "url": "https://access.redhat.com/errata/RHSA-2024:0741"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7118289 vom 2024-02-15",
        "url": "https://www.ibm.com/support/pages/node/7118289"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0941 vom 2024-02-28",
        "url": "https://access.redhat.com/errata/RHSA-2024:0941"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4624-1 vom 2024-02-27",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018051.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0954 vom 2024-02-28",
        "url": "https://access.redhat.com/errata/RHSA-2024:0954"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0269 vom 2024-02-28",
        "url": "https://access.redhat.com/errata/RHSA-2024:0269"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7201 vom 2024-02-28",
        "url": "https://access.redhat.com/errata/RHSA-2023:7201"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7200 vom 2024-02-28",
        "url": "https://access.redhat.com/errata/RHSA-2023:7200"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7198 vom 2024-02-28",
        "url": "https://access.redhat.com/errata/RHSA-2023:7198"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6574-1 vom 2024-01-11",
        "url": "https://ubuntu.com/security/notices/USN-6574-1"
      },
      {
        "category": "external",
        "summary": "PDFreactor 11.6.10 Release History vom 2024-01-11",
        "url": "https://www.pdfreactor.com/product/changelog.htm"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0485 vom 2024-01-31",
        "url": "https://access.redhat.com/errata/RHSA-2024:0485"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7099297 vom 2023-12-18",
        "url": "https://www.ibm.com/support/pages/node/7099297"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0302 vom 2024-03-06",
        "url": "https://access.redhat.com/errata/RHSA-2024:0302"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1037 vom 2024-03-06",
        "url": "https://access.redhat.com/errata/RHSA-2024:1037"
      },
      {
        "category": "external",
        "summary": "Cisco Security Advisory",
        "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-13053 vom 2023-12-22",
        "url": "https://linux.oracle.com/errata/ELSA-2023-13053.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-13054 vom 2023-12-22",
        "url": "https://linux.oracle.com/errata/ELSA-2023-13054.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0837 vom 2024-02-20",
        "url": "https://access.redhat.com/errata/RHSA-2024:0837"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0304 vom 2024-01-19",
        "url": "https://access.redhat.com/errata/RHSA-2024:0304"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0660 vom 2024-02-07",
        "url": "https://access.redhat.com/errata/RHSA-2024:0660"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0642 vom 2024-02-07",
        "url": "https://access.redhat.com/errata/RHSA-2024:0642"
      },
      {
        "category": "external",
        "summary": "Google Blog vom 2023-10-10",
        "url": "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"
      },
      {
        "category": "external",
        "summary": "F5 NGINX Security Advisory K000137106 vom 2023-10-10",
        "url": "https://my.f5.com/manage/s/article/K000137106"
      },
      {
        "category": "external",
        "summary": "National Vulnerability Database CVE-2023-44487",
        "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0193 vom 2024-01-20",
        "url": "https://access.redhat.com/errata/RHSA-2024:0193"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0273 vom 2024-01-20",
        "url": "https://access.redhat.com/errata/RHSA-2024:0273"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0198 vom 2024-01-20",
        "url": "https://access.redhat.com/errata/RHSA-2024:0198"
      },
      {
        "category": "external",
        "summary": "FortiGuard Labs PSIRT Advisory FG-IR-23-397 vom 2024-02-08",
        "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-397"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-EPEL-2023-D499E96867 vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-d499e96867"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-1CAFFB88AF vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-1caffb88af"
      },
      {
        "category": "external",
        "summary": "Go Vulnerability Database GO-2023-2102 vom 2023-10-11",
        "url": "https://pkg.go.dev/vuln/GO-2023-2102"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-EPEL-2023-E2DD7FFA65 vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-e2dd7ffa65"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-EPEL-2023-834EF33019 vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-834ef33019"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-5FF7BF1DD8 vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-5ff7bf1dd8"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-54FADADA12 vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-54fadada12"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-B2C50535CB vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-b2c50535cb"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-EPEL-2023-C21E7D6BD5 vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-c21e7d6bd5"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-ED2642FD58 vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-ed2642fd58"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-3F70B8D406 vom 2023-10-12",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-3f70b8d406"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4069-1 vom 2023-10-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016680.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4068-1 vom 2023-10-13",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016681.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5749 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5749"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5738 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5738"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5724 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5724"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5721 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5721.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5721 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5721"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5720 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5720.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5720 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5720"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5719 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5719.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5719 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5719"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5716 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5716.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5716 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5716"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5715 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5715.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5714 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5714.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5714 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5714"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5713 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5713.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5713 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5713"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5712 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5712.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5711 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5711.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5711 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5711"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5710 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5710.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5709 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5709.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5709 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5709"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5708 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5708.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5708 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5708"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5707 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5707.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5706 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5706.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5705 vom 2023-10-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:5705.html"
      },
      {
        "category": "external",
        "summary": "Citrix Security Advisory CTX582159 vom 2023-10-16",
        "url": "https://support.citrix.com/article/CTX582159/cve202344487-http2-rapid-reset-attack-just-discovered"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3621 vom 2023-10-16",
        "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2023-2313 vom 2023-10-17",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2313.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS2-2023-2312 vom 2023-10-17",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2312.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5672 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5672"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5672 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5672.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5766 vom 2023-10-17",
        "url": "https://access.redhat.com/errata/RHSA-2023:5766"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5767 vom 2023-10-17",
        "url": "https://access.redhat.com/errata/RHSA-2023:5767"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5770 vom 2023-10-17",
        "url": "https://access.redhat.com/errata/RHSA-2023:5770"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5768 vom 2023-10-17",
        "url": "https://access.redhat.com/errata/RHSA-2023:5768"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5769 vom 2023-10-17",
        "url": "https://access.redhat.com/errata/RHSA-2023:5769"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5803 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5803"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5802 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5802"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5780 vom 2023-10-17",
        "url": "https://access.redhat.com/errata/RHSA-2023:5780"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5783 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5783"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5801 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5801"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5805 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5805"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5784 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5784"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5809 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5809"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5810 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5810"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASNGINX1-2023-006 vom 2023-10-18",
        "url": "https://alas.aws.amazon.com/AL2/ALASNGINX1-2023-006.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5711 vom 2023-10-17",
        "url": "https://linux.oracle.com/errata/ELSA-2023-5711.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5713 vom 2023-10-17",
        "url": "https://linux.oracle.com/errata/ELSA-2023-5713.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5675 vom 2023-10-18",
        "url": "https://rhn.redhat.com/errata/RHSA-2023:5675.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5710 vom 2023-10-18",
        "url": "https://linux.oracle.com/errata/ELSA-2023-5710.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5708 vom 2023-10-18",
        "url": "https://linux.oracle.com/errata/ELSA-2023-5708.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Advisory",
        "url": "https://www.ibm.com/support/pages/node/7109966"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7129250 vom 2024-03-01",
        "url": "https://www.ibm.com/support/pages/node/7129250"
      },
      {
        "category": "external",
        "summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
        "url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5677 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5677.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5679 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5679.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5712 vom 2023-10-18",
        "url": "https://oss.oracle.com/pipermail/el-errata/2023-October/014766.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-17EFD3F2CD vom 2023-10-19",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-17efd3f2cd"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5717 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5717"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5837 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5837"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5838 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5838"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5840 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5840"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5863 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5863.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5867 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5867.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5835 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5835"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5851 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5851"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5865 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5865.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5841 vom 2023-10-18",
        "url": "https://access.redhat.com/errata/RHSA-2023:5841"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5864 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5864.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5866 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5866.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5749 vom 2023-10-18",
        "url": "https://linux.oracle.com/errata/ELSA-2023-5749.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5721 vom 2023-10-19",
        "url": "http://linux.oracle.com/errata/ELSA-2023-5721.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-2A9214AF5F vom 2023-10-19",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-2a9214af5f"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-7934802344 vom 2023-10-19",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-7934802344"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2023-ACBEE8F31A vom 2023-10-18",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-acbee8f31a"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5738 vom 2023-10-19",
        "url": "https://linux.oracle.com/errata/ELSA-2023-5738.html"
      },
      {
        "category": "external",
        "summary": "Jenkins Security Advisory 2023-10-18",
        "url": "https://www.jenkins.io/security/advisory/2023-10-18/"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5922 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5922.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5946 vom 2023-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5946"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5952 vom 2023-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5952"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5930 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5930"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5951 vom 2023-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5951"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5935 vom 2023-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5935"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5945 vom 2023-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5945"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2023-1869 vom 2023-10-19",
        "url": "https://alas.aws.amazon.com/ALAS-2023-1869.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2023-1870 vom 2023-10-19",
        "url": "https://alas.aws.amazon.com/ALAS-2023-1870.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2023-1871 vom 2023-10-19",
        "url": "https://alas.aws.amazon.com/ALAS-2023-1871.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5838 vom 2023-10-19",
        "url": "https://linux.oracle.com/errata/ELSA-2023-5838.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5920 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5920"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5920 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5920.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5922 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5922"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5924 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5924"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5924 vom 2023-10-19",
        "url": "https://access.redhat.com/errata/RHSA-2023:5924.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5950 vom 2023-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5950"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5541 vom 2023-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5541.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5530 vom 2023-10-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:5530.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6057 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6057"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5989 vom 2023-10-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:5989"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6020 vom 2023-10-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:6020"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6020 vom 2023-10-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:6020.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6023 vom 2023-10-23",
        "url": "https://access.redhat.com/errata/RHSA-2023:6023"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6030 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6030"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4155-1 vom 2023-10-23",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016810.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6061 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6061"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6057 vom 2023-10-24",
        "url": "https://rhn.redhat.com/errata/RHSA-2023:6057.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6048 vom 2023-10-24",
        "url": "https://rhn.redhat.com/errata/RHSA-2023:6048.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6042 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6042"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5867 vom 2023-10-23",
        "url": "https://linux.oracle.com/errata/ELSA-2023-5867.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6031 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6031"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6039 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6039"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6044 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6044"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5863 vom 2023-10-23",
        "url": "https://linux.oracle.com/errata/ELSA-2023-5863.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6040 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6040"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6041 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6041"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6048 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6048"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6059 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6059"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5902 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:5902"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5989 vom 2023-10-25",
        "url": "http://linux.oracle.com/errata/ELSA-2023-5989.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4163-1 vom 2023-10-24",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016824.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6085 vom 2023-10-25",
        "url": "https://access.redhat.com/errata/RHSA-2023:6085"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6084 vom 2023-10-25",
        "url": "https://access.redhat.com/errata/RHSA-2023:6084"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6080 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6080"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6079 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6079"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6077 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6077"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6071 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:6071"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5895 vom 2023-10-25",
        "url": "https://access.redhat.com/errata/RHSA-2023:5895"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5542 vom 2023-10-24",
        "url": "https://access.redhat.com/errata/RHSA-2023:5542"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-5924 vom 2023-10-25",
        "url": "http://linux.oracle.com/errata/ELSA-2023-5924.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6116 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6116"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6117 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6117"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6118 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6118"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6119 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6119"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6120 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6120"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5896 vom 2023-10-25",
        "url": "https://access.redhat.com/errata/RHSA-2023:5896"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6121 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6121"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6122 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6122"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6114 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6114"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6115 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6115"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4200-1 vom 2023-10-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016846.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4199-1 vom 2023-10-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016847.html"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin vom 2023-10-26",
        "url": "https://www.ibm.com/support/pages/node/7060461"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5933 vom 2023-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:5933"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5947 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:5947"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6105 vom 2023-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:6105"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6106 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6106"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6137 vom 2023-10-26",
        "url": "https://access.redhat.com/errata/RHSA-2023:6137"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4210-1 vom 2023-10-26",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016857.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6148 vom 2023-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:6148"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-EPEL-2023-B951076A0F vom 2023-10-27",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-b951076a0f"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6022 vom 2023-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:6022"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6021 vom 2023-10-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:6021"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6144 vom 2023-10-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:6144"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6156 vom 2023-10-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:6156"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6161 vom 2023-10-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:6161"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6129 vom 2023-10-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:6129"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6200 vom 2023-10-31",
        "url": "https://access.redhat.com/errata/RHSA-2023:6200"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6130 vom 2023-10-31",
        "url": "https://access.redhat.com/errata/RHSA-2023:6130"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6202 vom 2023-10-31",
        "url": "https://access.redhat.com/errata/RHSA-2023:6202"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6165 vom 2023-10-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:6165"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6143 vom 2023-10-31",
        "url": "https://access.redhat.com/errata/RHSA-2023:6143"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5005 vom 2023-10-31",
        "url": "https://access.redhat.com/errata/RHSA-2023:5005"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5007 vom 2023-11-01",
        "url": "https://access.redhat.com/errata/RHSA-2023:5007"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-11-01",
        "url": "https://access.redhat.com/errata/RHSA-2023:6217"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:5009 vom 2023-11-01",
        "url": "https://access.redhat.com/errata/RHSA-2023:5009"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6220 vom 2023-11-01",
        "url": "https://access.redhat.com/errata/RHSA-2023:6220"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6154 vom 2023-11-01",
        "url": "https://access.redhat.com/errata/RHSA-2023:6154"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3638 vom 2023-10-31",
        "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7831 vom 2024-01-04",
        "url": "https://access.redhat.com/errata/RHSA-2023:7831"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6251 vom 2023-11-02",
        "url": "https://access.redhat.com/errata/RHSA-2023:6251"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6239 vom 2023-11-01",
        "url": "https://access.redhat.com/errata/RHSA-2023:6239"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6233 vom 2023-11-01",
        "url": "https://access.redhat.com/errata/RHSA-2023:6233"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALASECS-2023-016 vom 2023-11-01",
        "url": "https://alas.aws.amazon.com/AL2/ALASECS-2023-016.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6240 vom 2023-11-02",
        "url": "https://access.redhat.com/errata/RHSA-2023:6240"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6235 vom 2023-11-01",
        "url": "https://access.redhat.com/errata/RHSA-2023:6235"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6248 vom 2023-11-02",
        "url": "https://access.redhat.com/errata/RHSA-2023:6248"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6243 vom 2023-11-02",
        "url": "https://access.redhat.com/errata/RHSA-2023:6243"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5549 vom 2023-11-05",
        "url": "https://lists.debian.org/debian-security-announce/2023/msg00245.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6298 vom 2023-11-03",
        "url": "https://access.redhat.com/errata/RHSA-2023:6298"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3645 vom 2023-11-05",
        "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5549 vom 2023-11-06",
        "url": "https://www.debian.org/security/2023/dsa-5549"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6305 vom 2023-11-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:6305"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6779 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6779"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6782 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6782"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6781 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6781"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6746 vom 2023-11-07",
        "url": "https://access.redhat.com/errata/RHSA-2023:6746"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6783 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6783"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6786 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6786"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6787 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6787"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6788 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6788"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6784 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6784"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6828 vom 2023-11-09",
        "url": "https://access.redhat.com/errata/RHSA-2023:6828"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6817 vom 2023-11-09",
        "url": "https://access.redhat.com/errata/RHSA-2023:6817"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6272 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6272"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6271 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6271"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6257 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6257"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6256 vom 2023-11-08",
        "url": "https://access.redhat.com/errata/RHSA-2023:6256"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6832 vom 2023-11-09",
        "url": "https://access.redhat.com/errata/RHSA-2023:6832"
      },
      {
        "category": "external",
        "summary": "Varnish Security Advisory VSV00013 vom 2023-11-13",
        "url": "https://varnish-cache.org/security/VSV00013.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7216 vom 2023-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2023:7216"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7205 vom 2023-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2023:7205"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7215 vom 2023-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2023:7215"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7077069 vom 2023-11-16",
        "url": "https://www.ibm.com/support/pages/node/7077069"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6269 vom 2023-11-15",
        "url": "https://access.redhat.com/errata/RHSA-2023:6269"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6845 vom 2023-11-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:6845"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7247 vom 2023-11-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:7247"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6279 vom 2023-11-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:6279"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6836 vom 2023-11-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:6836"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6837 vom 2023-11-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:6840"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7218 vom 2023-11-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:7218"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:6846 vom 2023-11-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:6846"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7076252 vom 2023-11-15",
        "url": "https://www.ibm.com/support/pages/node/7076252"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:0777 vom 2024-02-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:0777"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4469-1 vom 2023-11-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7335 vom 2023-11-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:7335"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7334 vom 2023-11-16",
        "url": "https://access.redhat.com/errata/RHSA-2023:7334"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2023-6746 vom 2023-11-16",
        "url": "https://linux.oracle.com/errata/ELSA-2023-6746.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4472-1 vom 2023-11-16",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5558 vom 2023-11-18",
        "url": "https://www.debian.org/security/2023/dsa-5558"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7345 vom 2023-11-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:7345"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7344 vom 2023-11-20",
        "url": "https://access.redhat.com/errata/RHSA-2023:7344"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4492-1 vom 2023-11-20",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017128.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6505-1 vom 2023-11-22",
        "url": "https://ubuntu.com/security/notices/USN-6505-1"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202311-09 vom 2023-11-25",
        "url": "https://security.gentoo.org/glsa/202311-09"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7482 vom 2023-11-25",
        "url": "https://access.redhat.com/errata/RHSA-2023:7482"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7483 vom 2023-11-25",
        "url": "https://access.redhat.com/errata/RHSA-2023:7483"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7484 vom 2023-11-25",
        "url": "https://access.redhat.com/errata/RHSA-2023:7484"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7486 vom 2023-11-25",
        "url": "https://access.redhat.com/errata/RHSA-2023:7486"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7488 vom 2023-11-25",
        "url": "https://access.redhat.com/errata/RHSA-2023:7488"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7515 vom 2023-11-27",
        "url": "https://access.redhat.com/errata/RHSA-2023:7515"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7475 vom 2023-11-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:7475"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7555 vom 2023-11-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:7555"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7474 vom 2023-11-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:7474"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7478 vom 2023-11-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:7478"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7479 vom 2023-11-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:7479"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7479 vom 2023-11-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:7481"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7522 vom 2023-11-28",
        "url": "https://access.redhat.com/errata/RHSA-2023:7522"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7521 vom 2023-11-28",
        "url": "https://access.redhat.com/errata/RHSA-2023:7521"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7469 vom 2023-11-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:7469"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2023:4613-1 vom 2023-11-29",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017259.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7470 vom 2023-11-29",
        "url": "https://access.redhat.com/errata/RHSA-2023:7470"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7587 vom 2023-11-30",
        "url": "https://access.redhat.com/errata/RHSA-2023:7587"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5570 vom 2023-12-01",
        "url": "https://lists.debian.org/debian-security-announce/2023/msg00266.html"
      },
      {
        "category": "external",
        "summary": "VERITAS Security Advisory VTS23-014 vom 2023-12-04",
        "url": "https://www.veritas.com/support/en_US/security/VTS23-014"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7638 vom 2023-12-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:7638"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7637 vom 2023-12-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:7637"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7641 vom 2023-12-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:7641"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7639 vom 2023-12-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:7639"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7599 vom 2023-12-05",
        "url": "https://access.redhat.com/errata/RHSA-2023:7599"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7662 vom 2023-12-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:7662"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7653 vom 2023-12-06",
        "url": "https://access.redhat.com/errata/RHSA-2023:7653"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7610 vom 2023-12-07",
        "url": "https://access.redhat.com/errata/RHSA-2023:7610"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7607 vom 2023-12-07",
        "url": "https://access.redhat.com/errata/RHSA-2023:7607"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2023:7608 vom 2023-12-07",
        "url": "https://access.redhat.com/errata/RHSA-2023:7608"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7117224 vom 2024-03-20",
        "url": "https://www.ibm.com/support/pages/node/7117224"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-12226 vom 2024-03-20",
        "url": "https://linux.oracle.com/errata/ELSA-2024-12226.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1454 vom 2024-03-27",
        "url": "https://access.redhat.com/errata/RHSA-2024:1454"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1458 vom 2024-03-27",
        "url": "https://access.redhat.com/errata/RHSA-2024:1458"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1449 vom 2024-03-27",
        "url": "https://access.redhat.com/errata/RHSA-2024:1449"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1464 vom 2024-03-27",
        "url": "https://access.redhat.com/errata/RHSA-2024:1464"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7147550 vom 2024-04-05",
        "url": "https://www.ibm.com/support/pages/node/7147550"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7147788 vom 2024-04-09",
        "url": "https://www.ibm.com/support/pages/node/7147788"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-CC8FCAB025 vom 2024-04-16",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cc8fcab025"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1770 vom 2024-04-16",
        "url": "https://access.redhat.com/errata/RHSA-2024:1770"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin 7148393 vom 2024-04-16",
        "url": "https://www.ibm.com/support/pages/node/7148393"
      },
      {
        "category": "external",
        "summary": "IBM Security Bulletin",
        "url": "https://www.ibm.com/support/pages/node/7149178"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6754-1 vom 2024-04-26",
        "url": "https://ubuntu.com/security/notices/USN-6754-1"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2368 vom 2024-04-30",
        "url": "https://access.redhat.com/errata/RHSA-2024:2368"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2633 vom 2024-05-01",
        "url": "https://access.redhat.com/errata/RHSA-2024:2633"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6754-2 vom 2024-05-07",
        "url": "https://ubuntu.com/security/notices/USN-6754-2"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3121 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3121"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3927 vom 2024-06-14",
        "url": "https://access.redhat.com/errata/RHSA-2024:3927"
      }
    ],
    "source_lang": "en-US",
    "title": "http/2 Implementierungen: Schwachstelle erm\u00f6glicht Denial of Service",
    "tracking": {
      "current_release_date": "2024-06-13T22:00:00.000+00:00",
      "generator": {
        "date": "2024-06-14T08:08:55.074+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.0"
        }
      },
      "id": "WID-SEC-W-2023-2618",
      "initial_release_date": "2023-10-10T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2023-10-10T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2023-10-11T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Red Hat, Fedora und Go aufgenommen"
        },
        {
          "date": "2023-10-12T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2023-10-15T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2023-10-16T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-10-17T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Red Hat, Amazon und Oracle Linux aufgenommen"
        },
        {
          "date": "2023-10-18T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von Fedora, Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2023-10-19T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Red Hat, Amazon und Oracle Linux aufgenommen"
        },
        {
          "date": "2023-10-23T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Red Hat, SUSE und Oracle Linux aufgenommen"
        },
        {
          "date": "2023-10-24T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen"
        },
        {
          "date": "2023-10-25T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-10-26T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von IBM, Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2023-10-29T23:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Fedora und Red Hat aufgenommen"
        },
        {
          "date": "2023-10-30T23:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-10-31T23:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Red Hat und Debian aufgenommen"
        },
        {
          "date": "2023-11-01T23:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Red Hat und Amazon aufgenommen"
        },
        {
          "date": "2023-11-05T23:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Debian und Red Hat aufgenommen"
        },
        {
          "date": "2023-11-06T23:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-07T23:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-08T23:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-13T23:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von Varnish Software aufgenommen"
        },
        {
          "date": "2023-11-14T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-15T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von IBM und Red Hat aufgenommen"
        },
        {
          "date": "2023-11-16T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von SUSE, Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2023-11-19T23:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2023-11-20T23:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2023-11-22T23:00:00.000+00:00",
          "number": "27",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2023-11-26T23:00:00.000+00:00",
          "number": "28",
          "summary": "Neue Updates von Gentoo und Red Hat aufgenommen"
        },
        {
          "date": "2023-11-27T23:00:00.000+00:00",
          "number": "29",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-28T23:00:00.000+00:00",
          "number": "30",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-11-29T23:00:00.000+00:00",
          "number": "31",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2023-12-03T23:00:00.000+00:00",
          "number": "32",
          "summary": "Neue Updates von Debian und VERITAS aufgenommen"
        },
        {
          "date": "2023-12-04T23:00:00.000+00:00",
          "number": "33",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-12-05T23:00:00.000+00:00",
          "number": "34",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-12-06T23:00:00.000+00:00",
          "number": "35",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-12-10T23:00:00.000+00:00",
          "number": "36",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2023-12-12T23:00:00.000+00:00",
          "number": "37",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2023-12-18T23:00:00.000+00:00",
          "number": "38",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2023-12-21T23:00:00.000+00:00",
          "number": "39",
          "summary": "Neue Updates von Cisco und Oracle Linux aufgenommen"
        },
        {
          "date": "2024-01-03T23:00:00.000+00:00",
          "number": "40",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-07T23:00:00.000+00:00",
          "number": "41",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-01-10T23:00:00.000+00:00",
          "number": "42",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2024-01-11T23:00:00.000+00:00",
          "number": "43",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2024-01-18T23:00:00.000+00:00",
          "number": "44",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-21T23:00:00.000+00:00",
          "number": "45",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-22T23:00:00.000+00:00",
          "number": "46",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-01-24T23:00:00.000+00:00",
          "number": "47",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-01-28T23:00:00.000+00:00",
          "number": "48",
          "summary": "Neue Updates von Dell aufgenommen"
        },
        {
          "date": "2024-01-31T23:00:00.000+00:00",
          "number": "49",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-02-07T23:00:00.000+00:00",
          "number": "50",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-02-08T23:00:00.000+00:00",
          "number": "51",
          "summary": "Neue Updates von Fortinet aufgenommen"
        },
        {
          "date": "2024-02-11T23:00:00.000+00:00",
          "number": "52",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-02-13T23:00:00.000+00:00",
          "number": "53",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-02-14T23:00:00.000+00:00",
          "number": "54",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-02-20T23:00:00.000+00:00",
          "number": "55",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-02-27T23:00:00.000+00:00",
          "number": "56",
          "summary": "Neue Updates von Red Hat und SUSE aufgenommen"
        },
        {
          "date": "2024-03-03T23:00:00.000+00:00",
          "number": "57",
          "summary": "Neue Updates von IBM und XEROX aufgenommen"
        },
        {
          "date": "2024-03-06T23:00:00.000+00:00",
          "number": "58",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-03-19T23:00:00.000+00:00",
          "number": "59",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-03-20T23:00:00.000+00:00",
          "number": "60",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-03-26T23:00:00.000+00:00",
          "number": "61",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-03-27T23:00:00.000+00:00",
          "number": "62",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-04-07T22:00:00.000+00:00",
          "number": "63",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-04-09T22:00:00.000+00:00",
          "number": "64",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-04-16T22:00:00.000+00:00",
          "number": "65",
          "summary": "Neue Updates von Fedora, Red Hat und IBM aufgenommen"
        },
        {
          "date": "2024-04-23T22:00:00.000+00:00",
          "number": "66",
          "summary": "Neue Updates von IBM aufgenommen"
        },
        {
          "date": "2024-04-25T22:00:00.000+00:00",
          "number": "67",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2024-04-29T22:00:00.000+00:00",
          "number": "68",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-01T22:00:00.000+00:00",
          "number": "69",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-07T22:00:00.000+00:00",
          "number": "70",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "71",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-06-13T22:00:00.000+00:00",
          "number": "72",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "72"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cX14.3.3",
                "product": {
                  "name": "Cisco Expressway \u003cX14.3.3",
                  "product_id": "T031800",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:cisco:expressway_software:x14.3.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Expressway"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.4.2",
                "product": {
                  "name": "Cisco Firepower \u003c7.4.2",
                  "product_id": "T031793",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:cisco:firepower:7.4.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Firepower"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c17.15.1",
                "product": {
                  "name": "Cisco IOS XE \u003c17.15.1",
                  "product_id": "T031794",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:cisco:ios_xe:17.15.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "IOS XE"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.11.2",
                "product": {
                  "name": "Cisco IOS XR \u003c7.11.2",
                  "product_id": "T031795",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:cisco:ios_xr:7.11.2"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c24.1.1",
                "product": {
                  "name": "Cisco IOS XR \u003c24.1.1",
                  "product_id": "T031796",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:cisco:ios_xr:24.1.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "IOS XR"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "3000 Series Switches",
                "product": {
                  "name": "Cisco Nexus 3000 Series Switches",
                  "product_id": "T029478",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:cisco:nexus:3000_series_switches"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9000 Series Switches",
                "product": {
                  "name": "Cisco Nexus 9000 Series Switches",
                  "product_id": "T031797",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:cisco:nexus:9000_series_switches"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Nexus"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c3.10.4",
                "product": {
                  "name": "Cisco Prime Infrastructure \u003c3.10.4",
                  "product_id": "T031791",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:cisco:prime_infrastructure:3.10.4"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Prime Infrastructure"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c11.2",
                "product": {
                  "name": "Cisco Prime Network Registrar \u003c11.2",
                  "product_id": "T031790",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:cisco:prime_network_registrar:11.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Prime Network Registrar"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c15.2.0",
                "product": {
                  "name": "Cisco Secure Web Appliance \u003c15.2.0",
                  "product_id": "T031792",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:cisco:secure_web_appliance:15.2.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Secure Web Appliance"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cX14.3.3",
                "product": {
                  "name": "Cisco TelePresence \u003cX14.3.3",
                  "product_id": "T031801",
                  "product_identification_helper": {
                    "cpe": "cpe:/h:cisco:telepresence:x14.3.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "TelePresence"
          },
          {
            "category": "product_name",
            "name": "Cisco Unified Attendant Console Advanced",
            "product": {
              "name": "Cisco Unified Attendant Console Advanced",
              "product_id": "T031798",
              "product_identification_helper": {
                "cpe": "cpe:/a:cisco:unified_attendant_console_advanced:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Cisco Unified Contact Center Enterprise",
                "product": {
                  "name": "Cisco Unified Contact Center Enterprise",
                  "product_id": "2143",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:cisco:unified_contact_center_enterprise:-"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c12.6.2",
                "product": {
                  "name": "Cisco Unified Contact Center Enterprise \u003c12.6.2",
                  "product_id": "T031799",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:cisco:unified_contact_center_enterprise:12.6.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Unified Contact Center Enterprise"
          }
        ],
        "category": "vendor",
        "name": "Cisco"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Citrix Systems ADC",
            "product": {
              "name": "Citrix Systems ADC",
              "product_id": "T019841",
              "product_identification_helper": {
                "cpe": "cpe:/o:citrix:application_delivery_controller_firmware:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "Citrix Systems Citrix Gateway",
            "product": {
              "name": "Citrix Systems Citrix Gateway",
              "product_id": "616020",
              "product_identification_helper": {
                "cpe": "cpe:/h:citrix:gateway:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Citrix Systems"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "vProxy\u003c19.9.0.4",
                "product": {
                  "name": "Dell NetWorker vProxy\u003c19.9.0.4",
                  "product_id": "T032377",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:networker:vproxy_19.9.0.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "vProxy\u003c19.10",
                "product": {
                  "name": "Dell NetWorker vProxy\u003c19.10",
                  "product_id": "T032378",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:dell:networker:vproxy_19.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "NetWorker"
          }
        ],
        "category": "vendor",
        "name": "Dell"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.4.2",
                "product": {
                  "name": "Fortinet FortiOS \u003c7.4.2",
                  "product_id": "T031933",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:fortinet:fortios:7.4.2"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.2.7",
                "product": {
                  "name": "Fortinet FortiOS \u003c7.2.7",
                  "product_id": "T032608",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:fortinet:fortios:7.2.7"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.0.14",
                "product": {
                  "name": "Fortinet FortiOS \u003c7.0.14",
                  "product_id": "T032609",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:fortinet:fortios:7.0.14"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FortiOS"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.4.2",
                "product": {
                  "name": "Fortinet FortiProxy \u003c7.4.2",
                  "product_id": "T031934",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:fortinet:fortiproxy:7.4.2"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.2.8",
                "product": {
                  "name": "Fortinet FortiProxy \u003c7.2.8",
                  "product_id": "T032610",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:fortinet:fortiproxy:7.2.8"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7",
                "product": {
                  "name": "Fortinet FortiProxy 7.0",
                  "product_id": "T032611",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:fortinet:fortiproxy:7.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FortiProxy"
          }
        ],
        "category": "vendor",
        "name": "Fortinet"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c1.21.3",
                "product": {
                  "name": "Golang Go \u003c1.21.3",
                  "product_id": "T030466",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:golang:go:1.21.3"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c1.20.10",
                "product": {
                  "name": "Golang Go \u003c1.20.10",
                  "product_id": "T030467",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:golang:go:1.20.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Go"
          }
        ],
        "category": "vendor",
        "name": "Golang"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "IBM App Connect Enterprise",
            "product": {
              "name": "IBM App Connect Enterprise",
              "product_id": "T032495",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:app_connect_enterprise:-"
              }
            }
          },
          {
            "category": "product_name",
            "name": "IBM Business Automation Workflow",
            "product": {
              "name": "IBM Business Automation Workflow",
              "product_id": "T019704",
              "product_identification_helper": {
                "cpe": "cpe:/a:ibm:business_automation_workflow:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c10.0.1.16",
                "product": {
                  "name": "IBM DataPower Gateway \u003c10.0.1.16",
                  "product_id": "T030798",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:datapower_gateway:10.0.1.16"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c10.5.0.8",
                "product": {
                  "name": "IBM DataPower Gateway \u003c10.5.0.8",
                  "product_id": "T030800",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:datapower_gateway:10.5.0.8"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "DataPower Gateway"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "11.7",
                "product": {
                  "name": "IBM InfoSphere Information Server 11.7",
                  "product_id": "444803",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:infosphere_information_server:11.7"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "InfoSphere Information Server"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.6.1",
                "product": {
                  "name": "IBM Maximo Asset Management 7.6.1",
                  "product_id": "T033948",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:maximo_asset_management:7.6.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Maximo Asset Management"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "8.10.x",
                "product": {
                  "name": "IBM Operational Decision Manager 8.10.x",
                  "product_id": "T027827",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:operational_decision_manager:8.10.x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "8.11.x",
                "product": {
                  "name": "IBM Operational Decision Manager 8.11.x",
                  "product_id": "T027828",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:operational_decision_manager:8.11.x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "8.12.x",
                "product": {
                  "name": "IBM Operational Decision Manager 8.12.x",
                  "product_id": "T030120",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:operational_decision_manager:8.12.x"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Operational Decision Manager"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "v10",
                "product": {
                  "name": "IBM Power Hardware Management Console v10",
                  "product_id": "T023373",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:hardware_management_console:v10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Power Hardware Management Console"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.5",
                "product": {
                  "name": "IBM QRadar SIEM 7.5",
                  "product_id": "T022954",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:qradar_siem:7.5"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "QRadar SIEM"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "10.0.0.0-10.0.6.1",
                "product": {
                  "name": "IBM Security Verify Access 10.0.0.0-10.0.6.1",
                  "product_id": "T031895",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Security Verify Access"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "5.1",
                "product": {
                  "name": "IBM Spectrum Scale 5.1",
                  "product_id": "T021060",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:spectrum_scale:5.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Storage Scale"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "8.1",
                "product": {
                  "name": "IBM TXSeries 8.1",
                  "product_id": "T029287",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:txseries:8.1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "8.2",
                "product": {
                  "name": "IBM TXSeries 8.2",
                  "product_id": "T029288",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:txseries:8.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.1",
                "product": {
                  "name": "IBM TXSeries 9.1",
                  "product_id": "T029292",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:txseries:9.1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "TXSeries"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "Liberty",
                "product": {
                  "name": "IBM WebSphere Application Server Liberty",
                  "product_id": "T011504",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:ibm:websphere_application_server:liberty"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "WebSphere Application Server"
          }
        ],
        "category": "vendor",
        "name": "IBM"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cweekly 2.428",
                "product": {
                  "name": "Jenkins Jenkins \u003cweekly 2.428",
                  "product_id": "T030677",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:cloudbees:jenkins:weekly_2.428"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cLTS 2.414.3",
                "product": {
                  "name": "Jenkins Jenkins \u003cLTS 2.414.3",
                  "product_id": "T030678",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:cloudbees:jenkins:lts_2.414.3"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Jenkins"
          }
        ],
        "category": "vendor",
        "name": "Jenkins"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "NGINX NGINX",
            "product": {
              "name": "NGINX NGINX",
              "product_id": "T015266",
              "product_identification_helper": {
                "cpe": "cpe:/a:nginx:nginx:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "NGINX"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.3.1",
                "product": {
                  "name": "Open Source Varnish HTTP Cache \u003c7.3.1",
                  "product_id": "T031066",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:varnish_http_accelerator_integration_project:varnish:7.3.1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c7.4.2",
                "product": {
                  "name": "Open Source Varnish HTTP Cache \u003c7.4.2",
                  "product_id": "T031067",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:varnish_http_accelerator_integration_project:varnish:7.4.2"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c6.0.12 LTS",
                "product": {
                  "name": "Open Source Varnish HTTP Cache \u003c6.0.12 LTS",
                  "product_id": "T031068",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:varnish_http_accelerator_integration_project:varnish:6.0.12_lts"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Varnish HTTP Cache"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c11.6.10",
                "product": {
                  "name": "RealObjects PDFreactor \u003c11.6.10",
                  "product_id": "T032023",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:realobjects:pdfreactor:11.6.10"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "PDFreactor"
          }
        ],
        "category": "vendor",
        "name": "RealObjects"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux",
                "product": {
                  "name": "Red Hat Enterprise Linux",
                  "product_id": "67646",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Software Collections",
                "product": {
                  "name": "Red Hat Enterprise Linux Software Collections",
                  "product_id": "T031234",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:software_collections"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "Service Registry 1",
                "product": {
                  "name": "Red Hat Integration Service Registry 1",
                  "product_id": "T031465",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:integration:service_registry_1"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Integration"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat OpenShift",
                "product": {
                  "name": "Red Hat OpenShift",
                  "product_id": "367115",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:-"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.11",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.11",
                  "product_id": "T025990",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.11"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.12",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.12",
                  "product_id": "T026435",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Container Platform 4.10",
                "product": {
                  "name": "Red Hat OpenShift Container Platform 4.10",
                  "product_id": "T027233",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.10"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cContainer  4.11.54",
                "product": {
                  "name": "Red Hat OpenShift \u003cContainer  4.11.54",
                  "product_id": "T031389",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container__4.11.54"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003cContainer Platform 4.11.54",
                "product": {
                  "name": "Red Hat OpenShift \u003cContainer Platform 4.11.54",
                  "product_id": "T031390",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.11.54"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccontainer platform 4.14.4",
                "product": {
                  "name": "Red Hat OpenShift \u003ccontainer platform 4.14.4",
                  "product_id": "T031393",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform_4.14.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.14.7",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.14.7",
                  "product_id": "T031849",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.14.7"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.12.48",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.12.48",
                  "product_id": "T032442",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.12.48"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "Kube Descheduler Operator 5",
                "product": {
                  "name": "Red Hat OpenShift Kube Descheduler Operator 5",
                  "product_id": "T033270",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:kube_descheduler_operator_5"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.13.36",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.13.36",
                  "product_id": "T033271",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.13.36"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "Container Platform \u003c4.15.5",
                "product": {
                  "name": "Red Hat OpenShift Container Platform \u003c4.15.5",
                  "product_id": "T033704",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:openshift:container_platform__4.15.5"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenShift"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Specification http/2",
            "product": {
              "name": "Specification http/2",
              "product_id": "T030386",
              "product_identification_helper": {
                "cpe": "cpe:/a:ietf:http2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Specification"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Veritas Enterprise Vault",
            "product": {
              "name": "Veritas Enterprise Vault",
              "product_id": "T017967",
              "product_identification_helper": {
                "cpe": "cpe:/a:veritas:enterprise_vault:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Veritas"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "v9",
                "product": {
                  "name": "Xerox FreeFlow Print Server v9",
                  "product_id": "T015632",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:v9"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FreeFlow Print Server"
          }
        ],
        "category": "vendor",
        "name": "Xerox"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-44487",
      "notes": [
        {
          "category": "description",
          "text": "Es existiert eine Schwachstelle in verschiedenen http/2 Implementierungen. Bei der \u00dcberpr\u00fcfung von Stream-Limits werden abgebrochene Verbindungen nicht gez\u00e4hlt, obwohl der Worker-Prozess noch an der Anfrage arbeitet. Ein Angreifer kann dies f\u00fcr einen Denial-of-Service-Angriff ausnutzen, indem er zahlreiche Anfragestr\u00f6me parallel \u00f6ffnet und jeden einzelnen mit dem RST_STREAM-Frame des HTTP/2-Protokolls schnell abbricht, ohne auf Antworten zu warten. Diese Art von Angriff wird als \"HTTP/2 Rapid Reset\"-Angriff bezeichnet."
        }
      ],
      "product_status": {
        "known_affected": [
          "T031895",
          "T030800",
          "T031933",
          "T029292",
          "T033271",
          "T004914",
          "T032023",
          "T030120",
          "T033270",
          "398363",
          "T031849",
          "T033948",
          "T027233",
          "T031465",
          "T031068",
          "T031389",
          "T021060",
          "T015632",
          "T012167",
          "T031067",
          "T031066",
          "T022954",
          "2951",
          "T002207",
          "444803",
          "T019704",
          "T017967",
          "T031934",
          "T026435",
          "T011504",
          "T031234",
          "T031795",
          "T030386",
          "T031794",
          "616020",
          "T030466",
          "T031797",
          "T031796",
          "T031799",
          "67646",
          "T030467",
          "T031798",
          "T031390",
          "T031393",
          "T031791",
          "T015266",
          "T031790",
          "T032442",
          "T031793",
          "T031792",
          "T025990",
          "T029478",
          "T023373",
          "T029288",
          "T032610",
          "T029287",
          "T032611",
          "T032377",
          "T032378",
          "T030677",
          "T030798",
          "T033704",
          "T031801",
          "T030678",
          "T031800",
          "2143",
          "74185",
          "T032495",
          "T019841",
          "T027827",
          "T027828",
          "T000126",
          "367115",
          "T032608",
          "T032609"
        ]
      },
      "release_date": "2023-10-10T22:00:00Z",
      "title": "CVE-2023-44487"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.