Search for packages
| purl | pkg:rpm/redhat/httpd24-httpd@2.4.34-8.el7?arch=1 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-9hzg-r1fj-pubf
Aliases: CVE-2019-9513 |
Excessive CPU usage in HTTP/2 with priority changes | There are no reported fixed by versions. |
|
VCID-dmv4-ydq9-a7eq
Aliases: CVE-2019-9511 |
Excessive CPU usage in HTTP/2 with small window updates | There are no reported fixed by versions. |
|
VCID-y3k1-c4rn-xbc2
Aliases: CVE-2019-9517 |
A malicious client could perform a DoS attack by flooding a connection with requests and basically never reading responses on the TCP connection. Depending on h2 worker dimensioning, it was possible to block those with relatively few connections. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T14:17:52.380201+00:00 | RedHat Importer | Affected by | VCID-y3k1-c4rn-xbc2 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9517.json | 38.0.0 |
| 2026-04-01T14:17:49.925089+00:00 | RedHat Importer | Affected by | VCID-dmv4-ydq9-a7eq | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9511.json | 38.0.0 |
| 2026-04-01T14:17:31.286467+00:00 | RedHat Importer | Affected by | VCID-9hzg-r1fj-pubf | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9513.json | 38.0.0 |