|
Message-Id: <E1ezZFo-00031d-BB@romulus.home.bitnebula.com> Date: Fri, 23 Mar 2018 21:50:00 -0500 From: Daniel Ruggeri <druggeri@...che.org> To: announce@...pd.apache.org, oss-security@...ts.openwall.com, security@...pd.apache.org Subject: CVE-2018-1302: Possible write of after free on HTTP/2 stream shutdown CVE-2018-1302: Possible write of after free on HTTP/2 stream shutdown Severity: Low Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.17 to 2.4.29 Description: When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.30 could have written a NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerabilty hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk. Mitigation: All httpd users should upgrade to 2.4.30 or later. Credit: The issue was discovered by Robert Swiecki, bug found by honggfuzz References: https://httpd.apache.org/security/vulnerabilities_24.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.