mod_http2-1.15.19-5.el9_3.1
エラータID: AXSA:2024-7695:01
Release date:
Friday, April 19, 2024 - 17:24
Subject:
mod_http2-1.15.19-5.el9_3.1
Affected Channels:
MIRACLE LINUX 9 for x86_64
Severity:
High
Description:
The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.
Security Fix(es):
* httpd: CONTINUATION frames DoS (CVE-2024-27316)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2024-27316
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
Solution:
Update packages.
CVEs:
CVE-2024-27316
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
Additional Info:
N/A
Download:
SRPMS
- mod_http2-1.15.19-5.el9_3.1.src.rpm
MD5: e8ebbf241910467e9db271dfba2d9c2b
SHA-256: 51ee5dc2d0a13f6ca0824eebca4906f36e5d34e3d606b6f244a021c48aa0b312
Size: 1.02 MB
Asianux Server 9 for x86_64
- mod_http2-1.15.19-5.el9_3.1.x86_64.rpm
MD5: b8969ba74a9632cc38b3db1a18af5fe2
SHA-256: b84bfcb29e00c1545afa61b3301b35a8632ddd45c0d92515dd50b38d15d2c5a7
Size: 147.99 kB