Bug 1743974 (CVE-2019-10082)

Summary: CVE-2019-10082 httpd: read-after-free in h2 connection shutdown
Product: [Other] Security Response Reporter: Dhananjay Arunesh <darunesh>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: anon.amish, bnater, csutherl, dmoppert, gzaronik, hhorak, jclere, jdoyle, jkaluza, jorton, kdudka, krathod, lgao, luhliari, mbabacek, mturk, myarboro, pahan, pslavice, rsvoboda, twalsh, weli, yozone
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: httpd 2.4.41 Doc Type: If docs needed, set a value
Doc Text:
A read-after-free vulnerability was discovered in Apache httpd, in mod_http2. A specially crafted http/2 client session could cause the server to read memory that was previously freed during connection shutdown, potentially leading to a crash.
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-06 22:31:56 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1743975, 1743976, 1747288, 1747289    
Bug Blocks: 1744000    

Description Dhananjay Arunesh 2019-08-21 05:37:36 UTC
A vulnerability was found in httpd, where using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.

Comment 1 Dhananjay Arunesh 2019-08-21 05:38:22 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 1743975]


Created mod_http2 tracking bugs for this issue:

Affects: fedora-all [bug 1743976]


Created nghttp2 tracking bugs for this issue:

Affects: epel-all [bug 1743977]
Affects: fedora-all [bug 1743979]


Created nginx tracking bugs for this issue:

Affects: fedora-all [bug 1743981]


Created nodejs tracking bugs for this issue:

Affects: epel-all [bug 1743978]
Affects: fedora-all [bug 1743980]

Comment 2 Dhananjay Arunesh 2019-08-21 06:14:03 UTC
External References:

https://httpd.apache.org/security/vulnerabilities_24.html

Comment 3 Kamil Dudka 2019-08-21 07:04:40 UTC
Could you please explain why you created tracking bugs for nghttp2?

Comment 6 Joshua Padman 2019-08-28 12:27:18 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Enterprise Web Server 3

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 9 Doran Moppert 2019-09-04 03:31:04 UTC
Mitigation:

This flaw is only exploitable if Apache httpd is configured to respond to HTTP/2 requests, which is done by including "h2" or "h2c" in the "Protocols" list in a configuration file.  The following command can be used to search for possible vulnerable configurations: 

    grep -R '^\s*Protocols\>.*\<h2\>' /etc/httpd/

See https://httpd.apache.org/docs/2.4/mod/mod_http2.html

Comment 12 Kunjan Rathod 2019-10-14 11:58:17 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Enterprise Web Server 2

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 16 errata-xmlrpc 2020-04-06 19:10:13 UTC
This issue has been addressed in the following products:

  JBoss Core Services Apache HTTP Server 2.4.37 SP2

Via RHSA-2020:1336 https://access.redhat.com/errata/RHSA-2020:1336

Comment 17 errata-xmlrpc 2020-04-06 19:26:56 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 6
  JBoss Core Services on RHEL 7

Via RHSA-2020:1337 https://access.redhat.com/errata/RHSA-2020:1337

Comment 18 Product Security DevOps Team 2020-04-06 22:31:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-10082

Comment 20 errata-xmlrpc 2020-11-04 03:34:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4751 https://access.redhat.com/errata/RHSA-2020:4751