Release date:
2024-05-28 17:00:09 UTC
Description:
- CVE-2024-27316: fix HTTP/2 DoS vulnerability caused by memory exhaustion from
endless continuation frames: Incoming headers that exceed limits are buffered
in nghttp2 to generate an HTTP 413 response
Updated packages:
-
httpd-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
sha:b68b3d26a6e391929d792d29b953c4196ccec0d1
-
httpd-core-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
sha:49ab41d83edd40ad810789b3192e30a510c789c0
-
httpd-devel-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
sha:26052df922b1058044a91d6e592374346e4d3b3b
-
httpd-filesystem-2.4.53-11.el9_2.5.tuxcare.els2.noarch.rpm
sha:6a38cb98020b42906ac6a1e88bdc9a7969ff4dc3
-
httpd-manual-2.4.53-11.el9_2.5.tuxcare.els2.noarch.rpm
sha:d698ac6d6d6562c50e3e455a54e9448f92e87575
-
httpd-tools-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
sha:82527da84a4d7d75d12ab6f5977b245be906df95
-
mod_ldap-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
sha:3b26d15d6e2b68eb73cbfc5a415c155142946eb4
-
mod_lua-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
sha:5449234f580577906f3f68cec15ddfa7fcd9b03d
-
mod_proxy_html-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
sha:727350a1927983f92c97b9240494930cdf6b0a42
-
mod_session-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
sha:82dee55fd12e6dc4ea0d6f80347873d7f7967b36
-
mod_ssl-2.4.53-11.el9_2.5.tuxcare.els2.x86_64.rpm
sha:9757d6950dd4521569dc0611bfb08cf01a43a53e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.