Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:3121

Опубликовано: 14 июн. 2024
Источник: rocky
Оценка: Moderate

Описание

Moderate: httpd:2.4 security update

The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.

Security Fix(es):

  • httpd: mod_macro: out-of-bounds read vulnerability (CVE-2023-31122)

  • mod_http2: reset requests exhaust memory (incomplete fix of CVE-2023-44487) (CVE-2023-45802)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 8.10 Release Notes linked from the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
httpdx86_6464.module+el8.10.0+1717+030a9fedhttpd-2.4.37-64.module+el8.10.0+1717+030a9fed.x86_64.rpm
httpd-develx86_6464.module+el8.10.0+1717+030a9fedhttpd-devel-2.4.37-64.module+el8.10.0+1717+030a9fed.x86_64.rpm
httpd-filesystemnoarch64.module+el8.10.0+1717+030a9fedhttpd-filesystem-2.4.37-64.module+el8.10.0+1717+030a9fed.noarch.rpm
httpd-filesystemnoarch64.module+el8.10.0+1717+030a9fedhttpd-filesystem-2.4.37-64.module+el8.10.0+1717+030a9fed.noarch.rpm
httpd-manualnoarch64.module+el8.10.0+1717+030a9fedhttpd-manual-2.4.37-64.module+el8.10.0+1717+030a9fed.noarch.rpm
httpd-manualnoarch64.module+el8.10.0+1717+030a9fedhttpd-manual-2.4.37-64.module+el8.10.0+1717+030a9fed.noarch.rpm
httpd-toolsx86_6464.module+el8.10.0+1717+030a9fedhttpd-tools-2.4.37-64.module+el8.10.0+1717+030a9fed.x86_64.rpm
mod_http2x86_6410.module+el8.10.0+1775+6b057638mod_http2-1.15.7-10.module+el8.10.0+1775+6b057638.x86_64.rpm
mod_ldapx86_6464.module+el8.10.0+1717+030a9fedmod_ldap-2.4.37-64.module+el8.10.0+1717+030a9fed.x86_64.rpm
mod_mdx86_648.module+el8.9.0+1370+89cc8ad5mod_md-2.0.8-8.module+el8.9.0+1370+89cc8ad5.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
больше 1 года назад

ELSA-2024-3121: httpd:2.4 security update (MODERATE)

CVSS3: 5.9
ubuntu
около 2 лет назад

When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.

CVSS3: 7.5
redhat
около 2 лет назад

When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.

CVSS3: 5.9
nvd
около 2 лет назад

When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.

CVSS3: 5.9
msrc
около 2 лет назад

Описание отсутствует