Bug 1743974 (CVE-2019-10082) - CVE-2019-10082 httpd: read-after-free in h2 connection shutdown
Summary: CVE-2019-10082 httpd: read-after-free in h2 connection shutdown
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2019-10082
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1743975 1743976 1747288 1747289
Blocks: 1744000
TreeView+ depends on / blocked
 
Reported: 2019-08-21 05:37 UTC by Dhananjay Arunesh
Modified: 2023-03-24 15:17 UTC (History)
23 users (show)

Fixed In Version: httpd 2.4.41
Doc Type: If docs needed, set a value
Doc Text:
A read-after-free vulnerability was discovered in Apache httpd, in mod_http2. A specially crafted http/2 client session could cause the server to read memory that was previously freed during connection shutdown, potentially leading to a crash.
Clone Of:
Environment:
Last Closed: 2020-04-06 22:31:56 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:1336 0 None None None 2020-04-06 19:10:15 UTC
Red Hat Product Errata RHSA-2020:1337 0 None None None 2020-04-06 19:26:58 UTC
Red Hat Product Errata RHSA-2020:4751 0 None None None 2020-11-04 03:35:01 UTC

Description Dhananjay Arunesh 2019-08-21 05:37:36 UTC
A vulnerability was found in httpd, where using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.

Comment 1 Dhananjay Arunesh 2019-08-21 05:38:22 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 1743975]


Created mod_http2 tracking bugs for this issue:

Affects: fedora-all [bug 1743976]


Created nghttp2 tracking bugs for this issue:

Affects: epel-all [bug 1743977]
Affects: fedora-all [bug 1743979]


Created nginx tracking bugs for this issue:

Affects: fedora-all [bug 1743981]


Created nodejs tracking bugs for this issue:

Affects: epel-all [bug 1743978]
Affects: fedora-all [bug 1743980]

Comment 2 Dhananjay Arunesh 2019-08-21 06:14:03 UTC
External References:

https://httpd.apache.org/security/vulnerabilities_24.html

Comment 3 Kamil Dudka 2019-08-21 07:04:40 UTC
Could you please explain why you created tracking bugs for nghttp2?

Comment 6 Joshua Padman 2019-08-28 12:27:18 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Enterprise Web Server 3

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 9 Doran Moppert 2019-09-04 03:31:04 UTC
Mitigation:

This flaw is only exploitable if Apache httpd is configured to respond to HTTP/2 requests, which is done by including "h2" or "h2c" in the "Protocols" list in a configuration file.  The following command can be used to search for possible vulnerable configurations: 

    grep -R '^\s*Protocols\>.*\<h2\>' /etc/httpd/

See https://httpd.apache.org/docs/2.4/mod/mod_http2.html

Comment 12 Kunjan Rathod 2019-10-14 11:58:17 UTC
This vulnerability is out of security support scope for the following products:
 * Red Hat JBoss Enterprise Web Server 2

Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.

Comment 16 errata-xmlrpc 2020-04-06 19:10:13 UTC
This issue has been addressed in the following products:

  JBoss Core Services Apache HTTP Server 2.4.37 SP2

Via RHSA-2020:1336 https://access.redhat.com/errata/RHSA-2020:1336

Comment 17 errata-xmlrpc 2020-04-06 19:26:56 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 6
  JBoss Core Services on RHEL 7

Via RHSA-2020:1337 https://access.redhat.com/errata/RHSA-2020:1337

Comment 18 Product Security DevOps Team 2020-04-06 22:31:56 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-10082

Comment 20 errata-xmlrpc 2020-11-04 03:34:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:4751 https://access.redhat.com/errata/RHSA-2020:4751


Note You need to log in before you can comment on or make changes to this bug.