Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 14 Aug 2019 15:50:09 -0500
From: Daniel Ruggeri <druggeri@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2019-10081: mod_http2, memory corruption on early pushes


CVE-2019-10081: mod_http2, memory corruption on early pushes

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected:
httpd 2.4.20 to 2.4.39

Description:
HTTP/2 very early pushes, for example configured with "H2PushResource",
could lead to an overwrite of memory in the pushing request's pool,
leading to crashes. The memory copied is that of the configured push
link header values, not data supplied by the client.
 
Mitigation:
All httpd users deploying mod_http2 should upgrade to 2.4.40 or later.
Unpatched servers can disable HTTP/2 push with the "H2Push off" directive.

Credit:
The issue was discovered by Craig Young of Tripwire VERT, <vuln-report@...ur3.us>.

References:
https://httpd.apache.org/security/vulnerabilities_24.html

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.