Search for packages
| purl | pkg:rpm/redhat/mod_http2@2.0.26-2?arch=el9_4 |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 10.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-2e6w-fs4j-17g9
Aliases: CVE-2024-27316 |
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion. | There are no reported fixed by versions. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:48:33.632243+00:00 | RedHat Importer | Affected by | VCID-2e6w-fs4j-17g9 | https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27316.json | 38.0.0 |