vulnerability
SUSE: CVE-2024-24549: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 03/13/2024 | 04/12/2024 | 02/18/2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
03/13/2024
Added
04/12/2024
Modified
02/18/2025
Description
Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.
Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
Solution(s)
suse-upgrade-apache-commons-daemonsuse-upgrade-apache-commons-daemon-javadocsuse-upgrade-apache-commons-daemon-jsvcsuse-upgrade-apache-commons-dbcpsuse-upgrade-apache-commons-dbcp-javadocsuse-upgrade-apache-commons-pool2suse-upgrade-apache-commons-pool2-javadocsuse-upgrade-geronimo-annotation-1_0-apisuse-upgrade-geronimo-commonj-1_1-apissuse-upgrade-geronimo-corba-1_0-apissuse-upgrade-geronimo-corba-2_3-apissuse-upgrade-geronimo-ejb-2_1-apisuse-upgrade-geronimo-ejb-3_0-apisuse-upgrade-geronimo-el-1_0-apisuse-upgrade-geronimo-interceptor-3_0-apisuse-upgrade-geronimo-j2ee-1_4-apissuse-upgrade-geronimo-j2ee-connector-1_5-apisuse-upgrade-geronimo-j2ee-deployment-1_1-apisuse-upgrade-geronimo-j2ee-management-1_0-apisuse-upgrade-geronimo-j2ee-management-1_1-apisuse-upgrade-geronimo-jacc-1_0-apisuse-upgrade-geronimo-jacc-1_1-apisuse-upgrade-geronimo-jaf-1_0_2-apisuse-upgrade-geronimo-jaf-1_1-apisuse-upgrade-geronimo-javaee-deployment-1_1-apisuse-upgrade-geronimo-javamail-1_3_1-apisuse-upgrade-geronimo-javamail-1_4-apisuse-upgrade-geronimo-jaxr-1_0-apisuse-upgrade-geronimo-jaxrpc-1_1-apisuse-upgrade-geronimo-jms-1_1-apisuse-upgrade-geronimo-jpa-3_0-apisuse-upgrade-geronimo-jsp-2_0-apisuse-upgrade-geronimo-jsp-2_1-apisuse-upgrade-geronimo-jta-1_0_1b-apisuse-upgrade-geronimo-jta-1_1-apisuse-upgrade-geronimo-qname-1_1-apisuse-upgrade-geronimo-saaj-1_1-apisuse-upgrade-geronimo-servlet-2_4-apisuse-upgrade-geronimo-servlet-2_5-apisuse-upgrade-geronimo-stax-1_0-apisuse-upgrade-geronimo-ws-metadata-2_0-apisuse-upgrade-jakarta-taglibs-standardsuse-upgrade-jakarta-taglibs-standard-javadocsuse-upgrade-tomcatsuse-upgrade-tomcat-admin-webappssuse-upgrade-tomcat-docs-webappsuse-upgrade-tomcat-el-3_0-apisuse-upgrade-tomcat-embedsuse-upgrade-tomcat-javadocsuse-upgrade-tomcat-jsp-2_3-apisuse-upgrade-tomcat-jsvcsuse-upgrade-tomcat-libsuse-upgrade-tomcat-servlet-4_0-apisuse-upgrade-tomcat-webappssuse-upgrade-tomcat10suse-upgrade-tomcat10-admin-webappssuse-upgrade-tomcat10-docs-webappsuse-upgrade-tomcat10-el-5_0-apisuse-upgrade-tomcat10-embedsuse-upgrade-tomcat10-jsp-3_1-apisuse-upgrade-tomcat10-jsvcsuse-upgrade-tomcat10-libsuse-upgrade-tomcat10-servlet-6_0-apisuse-upgrade-tomcat10-webapps

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.