RLSA-2024:1691

Source
https://errata.rockylinux.org/RLSA-2024:1691
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:1691.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:1691
Related
Published
2024-05-10T14:32:38.114770Z
Modified
2024-05-10T14:34:20.273406Z
Summary
Important: varnish security update
Details

Varnish Cache is a high-performance HTTP accelerator. It stores web pages in memory so web servers don't have to create the same web page over and over again, giving the website a significant speed up.

Security Fix(es):

  • varnish: HTTP/2 Broken Window Attack may result in denial of service (CVE-2024-30156)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / varnish

Package

Name
varnish
Purl
pkg:rpm/rocky-linux/varnish?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:6.6.2-4.el9_3.1