[CLSA-2024:1716924362] httpd: Fix of CVE-2024-27316
Type:
security
Severity:
Important
Release date:
2024-05-28 20:00:33 UTC
Description:
- CVE-2024-27316: fix HTTP/2 DoS vulnerability caused by memory exhaustion from endless continuation frames: Incoming headers that exceed limits are buffered in nghttp2 to generate an HTTP 413 response
Updated packages:
  • httpd-2.4.37-43.module_el8.5.0+2179+6f259f31.tuxcare.els13.x86_64.rpm
    sha:5312d220888756571425545897cab98c8620aad8
  • httpd-devel-2.4.37-43.module_el8.5.0+2179+6f259f31.tuxcare.els13.x86_64.rpm
    sha:8f61b8d89e46136d9ffb26768a1f6c848987c8e6
  • httpd-filesystem-2.4.37-43.module_el8.5.0+2179+6f259f31.tuxcare.els13.noarch.rpm
    sha:aa1bd2d6af85d3daf8b9b53c9193251f37b3b8af
  • httpd-manual-2.4.37-43.module_el8.5.0+2179+6f259f31.tuxcare.els13.noarch.rpm
    sha:8a165b390d8a55b00d31946ac5abfeb8571ddd8e
  • httpd-tools-2.4.37-43.module_el8.5.0+2179+6f259f31.tuxcare.els13.x86_64.rpm
    sha:00e9944ab6702b7b9f071d9b641f0eae2b9edf2b
  • mod_ldap-2.4.37-43.module_el8.5.0+2179+6f259f31.tuxcare.els13.x86_64.rpm
    sha:0b47d5e1ec7b4d0a5e88146743e641b17a940022
  • mod_proxy_html-2.4.37-43.module_el8.5.0+2179+6f259f31.tuxcare.els13.x86_64.rpm
    sha:42f1da36d344668555a6e3461e7994e536cdcc49
  • mod_session-2.4.37-43.module_el8.5.0+2179+6f259f31.tuxcare.els13.x86_64.rpm
    sha:f15021a4c58216e69c8c790a7a084d543ace07ed
  • mod_ssl-2.4.37-43.module_el8.5.0+2179+6f259f31.tuxcare.els13.x86_64.rpm
    sha:3a86abd2a4fb39918f5133c6318e7390c3de6c68
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.