HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.
References
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html - | |
References | () https://httpd.apache.org/security/vulnerabilities_24.html - Exploit, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://seclists.org/bugtraq/2019/Aug/47 - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201909-04 - | |
References | () https://security.netapp.com/advisory/ntap-20190905-0003/ - | |
References | () https://support.f5.com/csp/article/K84341091?utm_source=f5support&%3Butm_medium=RSS - | |
References | () https://usn.ubuntu.com/4113-1/ - | |
References | () https://www.debian.org/security/2019/dsa-4509 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2020.html - | |
References | () https://www.oracle.com/security-alerts/cpujul2020.html - | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - |
07 Nov 2023, 03:02
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-08-15 22:15
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10081
Mitre link : CVE-2019-10081
CVE.ORG link : CVE-2019-10081
JSON object : View
Products Affected
debian
- debian_linux
apache
- http_server
CWE
CWE-787
Out-of-bounds Write