[ALAS-2024-1931] Amazon Linux AMI 2014.03 - ALAS-2024-1931: important priority package update for httpd24
Severity
Important
Affected Packages
19
CVEs
1
Package updates are available for Amazon Linux AMI that fix the following vulnerabilities:
CVE-2024-27316:
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
- ID
- ALAS-2024-1931
- Severity
- important
- URL
- https://alas.aws.amazon.com/ALAS-2024-1931.html
- Published
-
2024-04-25T16:04:00
(4 months ago) - Modified
-
2024-04-25T16:04:00
(4 months ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALAS2-2024-2524
- ALPINE:CVE-2024-27316
- ALSA-2024:1786
- ALSA-2024:1872
- ALSA-2024:2564
- DSA-5662-1
- ELSA-2024-1786
- ELSA-2024-1872
- ELSA-2024-2564
- FEDORA-2024-1f11550e31
- FEDORA-2024-4812897dd1
- FEDORA-2024-528301bac2
- FREEBSD:8E6F684B-F333-11EE-A573-84A93843EB75
- RHSA-2024:1786
- RHSA-2024:1872
- RHSA-2024:2564
- RLSA-2024:2564
- SSA:2024-095-01
- SUSE-SU-2024:1627-1
- SUSE-SU-2024:1788-1
- SUSE-SU-2024:1868-1
- SUSE-SU-2024:1963-1
- USN-6729-1
- USN-6729-2
- USN-6729-3
- VU:421644
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2024-27316 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/mod24_ssl?arch=x86_64&distro=amazonlinux-1 | amazonlinux | mod24_ssl | < 2.4.59-1.102.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mod24_ssl?arch=i686&distro=amazonlinux-1 | amazonlinux | mod24_ssl | < 2.4.59-1.102.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/mod24_session?arch=x86_64&distro=amazonlinux-1 | amazonlinux | mod24_session | < 2.4.59-1.102.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mod24_session?arch=i686&distro=amazonlinux-1 | amazonlinux | mod24_session | < 2.4.59-1.102.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/mod24_proxy_html?arch=x86_64&distro=amazonlinux-1 | amazonlinux | mod24_proxy_html | < 2.4.59-1.102.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mod24_proxy_html?arch=i686&distro=amazonlinux-1 | amazonlinux | mod24_proxy_html | < 2.4.59-1.102.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/mod24_md?arch=x86_64&distro=amazonlinux-1 | amazonlinux | mod24_md | < 2.4.59-1.102.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mod24_md?arch=i686&distro=amazonlinux-1 | amazonlinux | mod24_md | < 2.4.59-1.102.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/mod24_ldap?arch=x86_64&distro=amazonlinux-1 | amazonlinux | mod24_ldap | < 2.4.59-1.102.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mod24_ldap?arch=i686&distro=amazonlinux-1 | amazonlinux | mod24_ldap | < 2.4.59-1.102.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/httpd24?arch=x86_64&distro=amazonlinux-1 | amazonlinux | httpd24 | < 2.4.59-1.102.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/httpd24?arch=i686&distro=amazonlinux-1 | amazonlinux | httpd24 | < 2.4.59-1.102.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/httpd24-tools?arch=x86_64&distro=amazonlinux-1 | amazonlinux | httpd24-tools | < 2.4.59-1.102.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/httpd24-tools?arch=i686&distro=amazonlinux-1 | amazonlinux | httpd24-tools | < 2.4.59-1.102.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/httpd24-manual?arch=noarch&distro=amazonlinux-1 | amazonlinux | httpd24-manual | < 2.4.59-1.102.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/httpd24-devel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | httpd24-devel | < 2.4.59-1.102.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/httpd24-devel?arch=i686&distro=amazonlinux-1 | amazonlinux | httpd24-devel | < 2.4.59-1.102.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/httpd24-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | httpd24-debuginfo | < 2.4.59-1.102.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/httpd24-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | httpd24-debuginfo | < 2.4.59-1.102.amzn1 | amazonlinux-1 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |