MGASA-2024-0267

Source
https://advisories.mageia.org/MGASA-2024-0267.html
Import Source
https://advisories.mageia.org/MGASA-2024-0267.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0267
Related
Published
2024-07-15T16:54:48Z
Modified
2024-07-15T16:29:17Z
Summary
Updated tomcat packages fix security vulnerability
Details

Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. (CVE-2024-34750)

References
Credits

Affected packages