Project

General

Profile

Bug #9576

apache2: DoS for HTTP/2 connections by continuous SETTINGS (CVE-2018-11763)

Added by Alicha CH 7 months ago. Updated 7 months ago.

Status:
Closed
Priority:
Normal
Category:
Security
Target version:
-
Start date:
10/25/2018
Due date:
% Done:

100%

Estimated time:
(Total: 0.00 h)
Affected versions:
Security IDs:

Description

In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time
without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.

Fixed in Version:

Apache httpd 2.4.35

References:

https://httpd.apache.org/security/vulnerabilities_24.html


Subtasks

Bug #9577: [3.9] apache2: DoS for HTTP/2 connections by continuous SETTINGS (CVE-2018-11763)ClosedKaarle Ritvanen

Bug #9578: [3.8] apache2: DoS for HTTP/2 connections by continuous SETTINGS (CVE-2018-11763)ClosedKaarle Ritvanen

Bug #9579: [3.7] apache2: DoS for HTTP/2 connections by continuous SETTINGS (CVE-2018-11763)ClosedKaarle Ritvanen

Bug #9580: [3.6] apache2: DoS for HTTP/2 connections by continuous SETTINGS (CVE-2018-11763)ClosedKaarle Ritvanen

Bug #9581: [3.5] apache2: DoS for HTTP/2 connections by continuous SETTINGS (CVE-2018-11763)ClosedKaarle Ritvanen

History

#1 Updated by Kaarle Ritvanen 7 months ago

  • Status changed from New to Resolved

#2 Updated by Alicha CH 7 months ago

  • Project changed from Alpine Security to Alpine Linux
  • Category set to Security
  • Status changed from Resolved to Closed
  • Security IDs deleted (CVE-2018-11763)

Also available in: Atom PDF