[ALAS2-2024-2524] Amazon Linux 2 2017.12 - ALAS2-2024-2524: important priority package update for mod_http2
Severity
Important
Affected Packages
6
CVEs
1
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2024-27316:
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
Package | Affected Version |
---|---|
pkg:rpm/amazonlinux/mod_http2?arch=x86_64&distro=amazonlinux-2 | < 1.15.19-1.amzn2.0.2 |
pkg:rpm/amazonlinux/mod_http2?arch=i686&distro=amazonlinux-2 | < 1.15.19-1.amzn2.0.2 |
pkg:rpm/amazonlinux/mod_http2?arch=aarch64&distro=amazonlinux-2 | < 1.15.19-1.amzn2.0.2 |
pkg:rpm/amazonlinux/mod_http2-debuginfo?arch=x86_64&distro=amazonlinux-2 | < 1.15.19-1.amzn2.0.2 |
pkg:rpm/amazonlinux/mod_http2-debuginfo?arch=i686&distro=amazonlinux-2 | < 1.15.19-1.amzn2.0.2 |
pkg:rpm/amazonlinux/mod_http2-debuginfo?arch=aarch64&distro=amazonlinux-2 | < 1.15.19-1.amzn2.0.2 |
- ID
- ALAS2-2024-2524
- Severity
- important
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2024-2524.html
- Published
-
2024-04-24T22:15:00
(4 months ago) - Modified
-
2024-04-24T22:15:00
(4 months ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALAS-2024-1931
- ALPINE:CVE-2024-27316
- ALSA-2024:1786
- ALSA-2024:1872
- ALSA-2024:2564
- DSA-5662-1
- ELSA-2024-1786
- ELSA-2024-1872
- ELSA-2024-2564
- FEDORA-2024-1f11550e31
- FEDORA-2024-4812897dd1
- FEDORA-2024-528301bac2
- FREEBSD:8E6F684B-F333-11EE-A573-84A93843EB75
- RHSA-2024:1786
- RHSA-2024:1872
- RHSA-2024:2564
- RLSA-2024:2564
- SSA:2024-095-01
- SUSE-SU-2024:1627-1
- SUSE-SU-2024:1788-1
- SUSE-SU-2024:1868-1
- SUSE-SU-2024:1963-1
- USN-6729-1
- USN-6729-2
- USN-6729-3
- VU:421644
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2024-27316 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27316 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/mod_http2?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mod_http2 | < 1.15.19-1.amzn2.0.2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mod_http2?arch=i686&distro=amazonlinux-2 | amazonlinux | mod_http2 | < 1.15.19-1.amzn2.0.2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mod_http2?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mod_http2 | < 1.15.19-1.amzn2.0.2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/mod_http2-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | mod_http2-debuginfo | < 1.15.19-1.amzn2.0.2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/mod_http2-debuginfo?arch=i686&distro=amazonlinux-2 | amazonlinux | mod_http2-debuginfo | < 1.15.19-1.amzn2.0.2 | amazonlinux-2 | i686 | |
Affected | pkg:rpm/amazonlinux/mod_http2-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | mod_http2-debuginfo | < 1.15.19-1.amzn2.0.2 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |