Bug 1145742 - (CVE-2019-10081) VUL-0: CVE-2019-10081: apache2: mod_http2, memory corruption on early pushes
(CVE-2019-10081)
VUL-0: CVE-2019-10081: apache2: mod_http2, memory corruption on early pushes
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Minor
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/239799/
CVSSv3:SUSE:CVE-2019-10081:5.3:(AV:N/...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-08-15 12:03 UTC by Robert Frohl
Modified: 2021-01-12 12:16 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Robert Frohl 2019-08-15 12:03:43 UTC
CVE-2019-10081: mod_http2, memory corruption on early pushes

Severity: Moderate
Vendor: The Apache Software Foundation
Versions Affected:
httpd 2.4.20 to 2.4.39

Description:
HTTP/2 very early pushes, for example configured with "H2PushResource",
could lead to an overwrite of memory in the pushing request's pool,
leading to crashes. The memory copied is that of the configured push
link header values, not data supplied by the client.
 
Mitigation:
All httpd users deploying mod_http2 should upgrade to 2.4.40 or later.
Unpatched servers can disable HTTP/2 push with the "H2Push off" directive.

Credit:
The issue was discovered by Craig Young of Tripwire VERT, .

References:
https://httpd.apache.org/security/vulnerabilities_24.html
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10081
http://seclists.org/oss-sec/2019/q3/137
Comment 1 Petr Gajdos 2019-08-22 08:46:40 UTC
Will be fixed by http2 module update to 1.15.4.
Comment 2 Petr Gajdos 2019-08-22 08:48:54 UTC
Will submit for 15,12sp2/apache2.
Comment 3 Petr Gajdos 2019-08-22 13:38:00 UTC
home:pgajdos:apache-test:after looks good; there is just apache-rex/mod_authn_dbd-mysql which is however unrelated and happens even before and I need to investigate later.

Packages submitted.

I believe all fixed.
Comment 5 Swamp Workflow Management 2019-08-28 13:16:14 UTC
SUSE-SU-2019:2237-1: An update that fixes 6 vulnerabilities is now available.

Category: security (important)
Bug References: 1145575,1145738,1145739,1145740,1145741,1145742
CVE References: CVE-2019-10081,CVE-2019-10082,CVE-2019-10092,CVE-2019-10097,CVE-2019-10098,CVE-2019-9517
Sources used:
SUSE Linux Enterprise Module for Server Applications 15-SP1 (src):    apache2-2.4.33-3.21.1
SUSE Linux Enterprise Module for Server Applications 15 (src):    apache2-2.4.33-3.21.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    apache2-2.4.33-3.21.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    apache2-2.4.33-3.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Swamp Workflow Management 2019-09-02 16:19:44 UTC
openSUSE-SU-2019:2051-1: An update that fixes 6 vulnerabilities is now available.

Category: security (important)
Bug References: 1145575,1145738,1145739,1145740,1145741,1145742
CVE References: CVE-2019-10081,CVE-2019-10082,CVE-2019-10092,CVE-2019-10097,CVE-2019-10098,CVE-2019-9517
Sources used:
openSUSE Leap 15.1 (src):    apache2-2.4.33-lp151.8.6.1
openSUSE Leap 15.0 (src):    apache2-2.4.33-lp150.2.23.1
Comment 7 Swamp Workflow Management 2019-09-06 19:12:33 UTC
SUSE-SU-2019:2329-1: An update that fixes 5 vulnerabilities is now available.

Category: security (important)
Bug References: 1145575,1145738,1145740,1145741,1145742
CVE References: CVE-2019-10081,CVE-2019-10082,CVE-2019-10092,CVE-2019-10098,CVE-2019-9517
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    apache2-2.4.23-29.43.1
SUSE Linux Enterprise Server 12-SP4 (src):    apache2-2.4.23-29.43.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Alexandros Toptsoglou 2020-05-25 08:18:31 UTC
Done