ALAS-2024-1931

Related Vulnerabilities: CVE-2024-27316  

HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion. (CVE-2024-27316)

ALAS-2024-1931


Amazon Linux 1 Security Advisory: ALAS-2024-1931
Advisory Release Date: 2024-04-25 16:04 Pacific
Advisory Updated Date: 2024-04-25 16:04 Pacific
Severity: Important

Issue Overview:

HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion. (CVE-2024-27316)


Affected Packages:

httpd24


Issue Correction:
Run yum update httpd24 to update your system.

New Packages:
i686:
    httpd24-debuginfo-2.4.59-1.102.amzn1.i686
    mod24_session-2.4.59-1.102.amzn1.i686
    httpd24-devel-2.4.59-1.102.amzn1.i686
    mod24_proxy_html-2.4.59-1.102.amzn1.i686
    httpd24-2.4.59-1.102.amzn1.i686
    mod24_ldap-2.4.59-1.102.amzn1.i686
    httpd24-tools-2.4.59-1.102.amzn1.i686
    mod24_ssl-2.4.59-1.102.amzn1.i686
    mod24_md-2.4.59-1.102.amzn1.i686

noarch:
    httpd24-manual-2.4.59-1.102.amzn1.noarch

src:
    httpd24-2.4.59-1.102.amzn1.src

x86_64:
    httpd24-2.4.59-1.102.amzn1.x86_64
    mod24_ldap-2.4.59-1.102.amzn1.x86_64
    httpd24-debuginfo-2.4.59-1.102.amzn1.x86_64
    mod24_proxy_html-2.4.59-1.102.amzn1.x86_64
    httpd24-tools-2.4.59-1.102.amzn1.x86_64
    httpd24-devel-2.4.59-1.102.amzn1.x86_64
    mod24_ssl-2.4.59-1.102.amzn1.x86_64
    mod24_session-2.4.59-1.102.amzn1.x86_64
    mod24_md-2.4.59-1.102.amzn1.x86_64