[CLSA-2024:1716915132] httpd: Fix of CVE-2024-27316
Type:
security
Severity:
Important
Release date:
2024-05-28 17:00:09 UTC
Description:
- CVE-2024-27316: fix HTTP/2 DoS vulnerability caused by memory exhaustion from endless continuation frames: Incoming headers that exceed limits are buffered in nghttp2 to generate an HTTP 413 response
Updated packages:
  • httpd-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
    sha:b68b3d26a6e391929d792d29b953c4196ccec0d1
  • httpd-core-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
    sha:49ab41d83edd40ad810789b3192e30a510c789c0
  • httpd-devel-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
    sha:26052df922b1058044a91d6e592374346e4d3b3b
  • httpd-filesystem-2.4.53-11.el9_2.5.tuxcare.els2.noarch.rpm
    sha:6a38cb98020b42906ac6a1e88bdc9a7969ff4dc3
  • httpd-manual-2.4.53-11.el9_2.5.tuxcare.els2.noarch.rpm
    sha:d698ac6d6d6562c50e3e455a54e9448f92e87575
  • httpd-tools-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
    sha:82527da84a4d7d75d12ab6f5977b245be906df95
  • mod_ldap-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
    sha:3b26d15d6e2b68eb73cbfc5a415c155142946eb4
  • mod_lua-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
    sha:5449234f580577906f3f68cec15ddfa7fcd9b03d
  • mod_proxy_html-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
    sha:727350a1927983f92c97b9240494930cdf6b0a42
  • mod_session-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
    sha:82dee55fd12e6dc4ea0d6f80347873d7f7967b36
  • mod_ssl-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
    sha:9757d6950dd4521569dc0611bfb08cf01a43a53e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.