Red Hat Bugzilla – Bug 1633399
CVE-2018-11763 httpd: DoS for HTTP/2 connections by continuous SETTINGS
Last modified: 2018-10-19 19:36:09 EDT
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol. References: https://httpd.apache.org/security/vulnerabilities_24.html
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1633400]
The httpd packages in Red Hat Enterprise Linux 7 and earlier do not include support for HTTP/2 and hence are not affected by this issue.
This issue is fixed upstream in httpd in the following commits: trunk: https://svn.apache.org/r1840010 2.4.x: https://svn.apache.org/r1840757 Which matches the change made downstream in mod_h2 on github: https://github.com/icing/mod_h2/commit/5e75e5685dd043fe93a5a08a15edd087a43f6968 i.e. this issue is fixed in httpd 2.4.35 and later, and in mod_http2 1.11.0 and later.