HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3818-1 apache2 security update
Debian DSA Debian DSA DSA-5662-1 apache2 security update
Ubuntu USN Ubuntu USN USN-6729-1 Apache HTTP Server vulnerabilities
Ubuntu USN Ubuntu USN USN-6729-2 Apache HTTP Server vulnerabilities
Ubuntu USN Ubuntu USN USN-6729-3 Apache HTTP Server vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 22:30:00 +0000


Tue, 04 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 18:30:00 +0000


Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.89857}

epss

{'score': 0.89946}


Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Aug 2024 23:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:7.4
cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7
cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8
cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-11-04T22:06:02.830Z

Reserved: 2024-02-23T14:20:56.465Z

Link: CVE-2024-27316

cve-icon Vulnrichment

Updated: 2025-11-04T22:06:02.830Z

cve-icon NVD

Status : Modified

Published: 2024-04-04T20:15:08.720

Modified: 2025-11-04T22:15:59.273

Link: CVE-2024-27316

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-04-03T00:00:00Z

Links: CVE-2024-27316 - Bugzilla

cve-icon OpenCVE Enrichment

No data.