Summary: | <www-servers/apache-2.4.25: HTTP/2 CONTINUATION denial of service (CVE-2016-8740) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Thomas Deutschmann (RETIRED) <whissi> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | polynomial-c |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://seclists.org/fulldisclosure/2016/Dec/17 | ||
Whiteboard: | B3 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 603130 | ||
Bug Blocks: |
Description
Thomas Deutschmann (RETIRED)
![]() CVE-2016-8740 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8740): The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request. This issue was resolved and addressed in GLSA 201701-36 at https://security.gentoo.org/glsa/201701-36 by GLSA coordinator Aaron Bauman (b-man). |