CVE-2024-31309
10.04.2024, 12:15
HTTP/2 CONTINUATIONDoS attack can cause Apache Traffic Server to consume more resources on the server. Version from 8.0.0 through 8.1.9, from 9.0.0 through 9.2.3 areaffected. Users can set a new setting (proxy.config.http2.max_continuation_frames_per_minute) to limit the number of CONTINUATION frames per minute. ATS does have a fixed amount of memory a request can use and ATS adheres to these limits in previous releases. Users are recommended to upgrade to versions 8.1.10 or 9.2.4 which fixes the issue.Enginsight
Vendor | Product | Version |
---|---|---|
apache | traffic_server | 8.0.0 ≤ 𝑥 < 8.1.10 |
apache | traffic_server | 9.0.0 ≤ 𝑥 < 9.2.4 |
debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References