[3.7] apache2: DoS for HTTP/2 connections by continuous SETTINGS (CVE-2018-11763)
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large
SETTINGS frames a client can occupy a connection, server thread and CPU
time
without any connection timeout coming to effect. This affects only
HTTP/2 connections. A possible mitigation is to not enable the h2
protocol.
Fixed in Version:
Apache httpd 2.4.35
References:
https://httpd.apache.org/security/vulnerabilities\_24.html
(from redmine: issue id 9579, created on 2018-10-25, closed on 2018-10-29)
- Relations:
- parent #9576 (closed)
- Changesets:
- Revision ea785d01 by Andy Postnikov on 2018-10-28T13:27:58Z:
main/apache2: security upgrade to 2.4.35 (CVE-2018-11763)
fixes #9579
- Revision aa79b6b1 by Natanael Copa on 2018-10-29T18:26:37Z:
main/xorg-server: security upgrade to 1.20.3 (CVE-2018-14665)
fixes #9579