Release date:
2024-05-28 19:16:11 UTC
Description:
- CVE-2024-27316: fix HTTP/2 DoS vulnerability caused by memory exhaustion from
endless continuation frames: Incoming headers that exceed limits are buffered
in nghttp2 to generate an HTTP 413 response
Updated packages:
-
httpd-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
sha:03b2c89a6af7935c9a639e55bae9231dddc15d8b
-
httpd-devel-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
sha:ba81915499de133cdd3a89ea5ee717ac8057a586
-
httpd-filesystem-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.noarch.rpm
sha:dfe405475736186a92059b26a3309869a1ae09aa
-
httpd-manual-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.noarch.rpm
sha:101a537f5f0a6f2c652862d3409291d2de8c835e
-
httpd-tools-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
sha:6e9b586355438dd5fd05f9f84de0337cd9773447
-
mod_ldap-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
sha:4f3aa7bc4be61c3bfc11076882222e8d78894bbb
-
mod_proxy_html-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
sha:25bd8c0d374617f10bc817364959510fe9ce4fa9
-
mod_session-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
sha:28548a58c2f3826fd090b45f9fad922573bbc869
-
mod_ssl-2.4.37-39.module_el8.4.0+2180+54659116.1.tuxcare.els14.x86_64.rpm
sha:bb17ca5c630b9deaf52ddbebf6c6609b222499b4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.