[CLSA-2024:1716923768] httpd: Fix of CVE-2024-27316
Type:
security
Severity:
Important
Release date:
2024-05-28 19:16:11 UTC
Description:
- CVE-2024-27316: fix HTTP/2 DoS vulnerability caused by memory exhaustion from endless continuation frames: Incoming headers that exceed limits are buffered in nghttp2 to generate an HTTP 413 response
Updated packages:
  • httpd-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
    sha:03b2c89a6af7935c9a639e55bae9231dddc15d8b
  • httpd-devel-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
    sha:ba81915499de133cdd3a89ea5ee717ac8057a586
  • httpd-filesystem-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.noarch.rpm
    sha:dfe405475736186a92059b26a3309869a1ae09aa
  • httpd-manual-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.noarch.rpm
    sha:101a537f5f0a6f2c652862d3409291d2de8c835e
  • httpd-tools-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
    sha:6e9b586355438dd5fd05f9f84de0337cd9773447
  • mod_ldap-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
    sha:4f3aa7bc4be61c3bfc11076882222e8d78894bbb
  • mod_proxy_html-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
    sha:25bd8c0d374617f10bc817364959510fe9ce4fa9
  • mod_session-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
    sha:28548a58c2f3826fd090b45f9fad922573bbc869
  • mod_ssl-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
    sha:bb17ca5c630b9deaf52ddbebf6c6609b222499b4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.