HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 09:04
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://seclists.org/fulldisclosure/2024/Jul/18 - | |
| References | () http://www.openwall.com/lists/oss-security/2024/04/04/4 - Mailing List | |
| References | () https://httpd.apache.org/security/vulnerabilities_24.html - Product, Release Notes | |
| References | () https://support.apple.com/kb/HT214119 - | |
| References | () https://www.openwall.com/lists/oss-security/2024/04/03/16 - | 
30 Jul 2024, 02:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
29 Jul 2024, 22:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
22 Jul 2024, 09:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
 | 
| CWE | 
10 Jun 2024, 17:16
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
06 Jun 2024, 19:29
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 7.5 | 
| CWE | CWE-770 | |
| References | () http://www.openwall.com/lists/oss-security/2024/04/03/16 - Mailing List | |
| References | () http://www.openwall.com/lists/oss-security/2024/04/04/4 - Mailing List | |
| References | () https://httpd.apache.org/security/vulnerabilities_24.html - Product, Release Notes | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FO73U3SLBYFGIW2YKXOK7RI4D6DJSZ2B/ - Release Notes | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MIUBKSCJGPJ6M2U63V6BKFDF725ODLG7/ - Release Notes | |
| References | () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QKKDVFWBKIHCC3WXNH3W75WWY4NW42OB/ - Release Notes | |
| References | () https://security.netapp.com/advisory/ntap-20240415-0013/ - Third Party Advisory | |
| CPE | cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:* | |
| First Time | Fedoraproject fedora Fedoraproject Netapp Netapp ontap Apache http Server Apache | 
01 May 2024, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
01 May 2024, 17:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Apr 2024, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
21 Apr 2024, 03:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
04 Apr 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-04-04 20:15
Updated : 2024-11-21 09:04
NVD link : CVE-2024-27316
Mitre link : CVE-2024-27316
CVE.ORG link : CVE-2024-27316
JSON object : View
Products Affected
                netapp
- ontap
fedoraproject
- fedora
apache
- http_server
CWE
                
                    
                        
                        CWE-770
                        
            Allocation of Resources Without Limits or Throttling
