Bug 1186924 - (CVE-2021-31618) VUL-0: CVE-2021-31618: apache2: NULL pointer dereference on specially crafted HTTP/2 request
(CVE-2021-31618)
VUL-0: CVE-2021-31618: apache2: NULL pointer dereference on specially crafted...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Major
: ---
Assigned To: Security Team bot
Security Team bot
https://smash.suse.de/issue/301271/
CVSSv3.1:SUSE:CVE-2021-31618:7.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-06-07 09:19 UTC by Gianluca Gabrielli
Modified: 2022-01-05 12:35 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gianluca Gabrielli 2021-06-07 09:19:11 UTC
Apache HTTP Server protocol handler for the HTTP/2 protocol checks received request headers against the size limitations as configured for the server and used for the HTTP/1 protocol as well. On violation of these restrictions and HTTP response is sent to the client with a status code indicating why the request was rejected.

This rejection response was not fully initialized in the HTTP/2 protocol handler if the offending header was the very first one received or appeared in a footer. This led to a NULL pointer dereference on initialized memory, crashing reliably the child process. Since such a triggering HTTP/2 request is easy to craft and submit, this can be exploited to DoS the server.

References:

https://httpd.apache.org/security/vulnerabilities_24.html

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1968013
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31618
Comment 1 Gianluca Gabrielli 2021-06-07 09:19:27 UTC
Affected packages:
 - SUSE:SLE-12-SP2:Update/apache2  2.4.23
 - SUSE:SLE-15:Update/apache2      2.4.33
 - SUSE:SLE-15-SP2:Update/apache2  2.4.43
 
Upstream patch [0].
 
[0] https://github.com/apache/httpd/commit/a4fba223668c554e06bc78d6e3a88f33d4238ae4.patch
Comment 5 Petr Gajdos 2021-06-09 16:59:52 UTC
I have taken:
http://svn.apache.org/viewvc?view=revision&revision=1883475

home:pgajdos:apache-test:after looks good.

Will submit for 12sp2,15,15sp2/apache2.
Comment 6 Petr Gajdos 2021-06-09 17:02:30 UTC
Packages submitted. I believe all fixed.
Comment 9 Swamp Workflow Management 2021-06-17 19:20:50 UTC
SUSE-SU-2021:2004-1: An update that solves 6 vulnerabilities and has two fixes is now available.

Category: security (important)
Bug References: 1145740,1180530,1182703,1186922,1186923,1186924,1187017,1187174
CVE References: CVE-2019-10092,CVE-2020-35452,CVE-2021-26690,CVE-2021-26691,CVE-2021-30641,CVE-2021-31618
JIRA References: 
Sources used:
SUSE Manager Server 4.0 (src):    apache2-2.4.33-3.50.1
SUSE Manager Retail Branch Server 4.0 (src):    apache2-2.4.33-3.50.1
SUSE Manager Proxy 4.0 (src):    apache2-2.4.33-3.50.1
SUSE Linux Enterprise Server for SAP 15-SP1 (src):    apache2-2.4.33-3.50.1
SUSE Linux Enterprise Server for SAP 15 (src):    apache2-2.4.33-3.50.1
SUSE Linux Enterprise Server 15-SP1-LTSS (src):    apache2-2.4.33-3.50.1
SUSE Linux Enterprise Server 15-SP1-BCL (src):    apache2-2.4.33-3.50.1
SUSE Linux Enterprise Server 15-LTSS (src):    apache2-2.4.33-3.50.1
SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (src):    apache2-2.4.33-3.50.1
SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (src):    apache2-2.4.33-3.50.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    apache2-2.4.33-3.50.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    apache2-2.4.33-3.50.1
SUSE Enterprise Storage 6 (src):    apache2-2.4.33-3.50.1
SUSE CaaS Platform 4.0 (src):    apache2-2.4.33-3.50.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2021-06-17 19:25:08 UTC
SUSE-SU-2021:2006-1: An update that fixes 5 vulnerabilities is now available.

Category: security (important)
Bug References: 1186922,1186923,1186924,1187017,1187174
CVE References: CVE-2020-35452,CVE-2021-26690,CVE-2021-26691,CVE-2021-30641,CVE-2021-31618
JIRA References: 
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    apache2-2.4.23-29.74.1
SUSE OpenStack Cloud Crowbar 8 (src):    apache2-2.4.23-29.74.1
SUSE OpenStack Cloud 9 (src):    apache2-2.4.23-29.74.1
SUSE OpenStack Cloud 8 (src):    apache2-2.4.23-29.74.1
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    apache2-2.4.23-29.74.1
SUSE Linux Enterprise Server for SAP 12-SP4 (src):    apache2-2.4.23-29.74.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    apache2-2.4.23-29.74.1
SUSE Linux Enterprise Server 12-SP5 (src):    apache2-2.4.23-29.74.1
SUSE Linux Enterprise Server 12-SP4-LTSS (src):    apache2-2.4.23-29.74.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    apache2-2.4.23-29.74.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    apache2-2.4.23-29.74.1
SUSE Linux Enterprise Server 12-SP2-BCL (src):    apache2-2.4.23-29.74.1
HPE Helion Openstack 8 (src):    apache2-2.4.23-29.74.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Swamp Workflow Management 2021-06-22 19:18:48 UTC
SUSE-SU-2021:2127-1: An update that fixes 6 vulnerabilities is now available.

Category: security (important)
Bug References: 1186922,1186923,1186924,1187017,1187040,1187174
CVE References: CVE-2020-13950,CVE-2020-35452,CVE-2021-26690,CVE-2021-26691,CVE-2021-30641,CVE-2021-31618
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Server Applications 15-SP3 (src):    apache2-2.4.43-3.22.1
SUSE Linux Enterprise Module for Server Applications 15-SP2 (src):    apache2-2.4.43-3.22.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15-SP3 (src):    apache2-2.4.43-3.22.1
SUSE Linux Enterprise Module for Basesystem 15-SP3 (src):    apache2-2.4.43-3.22.1
SUSE Linux Enterprise Module for Basesystem 15-SP2 (src):    apache2-2.4.43-3.22.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Swamp Workflow Management 2021-06-24 13:17:55 UTC
openSUSE-SU-2021:0908-1: An update that fixes 6 vulnerabilities is now available.

Category: security (important)
Bug References: 1186922,1186923,1186924,1187017,1187040,1187174
CVE References: CVE-2020-13950,CVE-2020-35452,CVE-2021-26690,CVE-2021-26691,CVE-2021-30641,CVE-2021-31618
JIRA References: 
Sources used:
openSUSE Leap 15.2 (src):    apache2-2.4.43-lp152.2.15.1
Comment 13 Swamp Workflow Management 2021-07-10 17:56:03 UTC
openSUSE-SU-2021:2127-1: An update that fixes 6 vulnerabilities is now available.

Category: security (important)
Bug References: 1186922,1186923,1186924,1187017,1187040,1187174
CVE References: CVE-2020-13950,CVE-2020-35452,CVE-2021-26690,CVE-2021-26691,CVE-2021-30641,CVE-2021-31618
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    apache2-2.4.43-3.22.1
Comment 14 Marcus Meissner 2021-08-21 09:19:25 UTC
released