Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-36387

Опубликовано: 01 июл. 2024
Источник: debian
EPSS Низкий

Описание

Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.60-1package

Примечания

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-36387

  • https://github.com/apache/httpd/commit/62aa64e5aea21dd969db97aded4443c98c0735ac

  • (see also https://svn.apache.org/viewvc?view=revision&revision=1918557)

EPSS

Процентиль: 51%
0.00282
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
12 месяцев назад

Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.

CVSS3: 3.7
redhat
12 месяцев назад

Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.

CVSS3: 5.4
nvd
12 месяцев назад

Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.

CVSS3: 5.4
msrc
7 месяцев назад

Описание отсутствует

rocky
7 месяцев назад

Low: mod_http2 security update

EPSS

Процентиль: 51%
0.00282
Низкий