First published: Wed Oct 30 2024(Updated: )
Low: mod_http2 security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for ARM64 EUS | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux for SAP Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:8680 is classified as low.
RHSA-2024:8680 addresses a denial of service vulnerability caused by a null pointer in websocket over HTTP/2, identified as CVE-2024-36387.
To fix RHSA-2024:8680, it is recommended to apply the latest security updates for the affected versions of the mod_http2 module.
RHSA-2024:8680 affects multiple Red Hat Enterprise Linux products specifically related to the mod_http2 Apache HTTPD module.
The impact of the vulnerability in RHSA-2024:8680 can potentially lead to a denial of service condition, affecting the availability of HTTP/2 services.