Описание
In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 2.4.29-1ubuntu4.10 |
| devel | not-affected | 2.4.41-1ubuntu1 |
| disco | released | 2.4.38-2ubuntu2.2 |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/bionic | released | 2.4.29-1ubuntu4.10 |
| esm-infra/xenial | not-affected | code not built |
| precise/esm | not-affected | code not present |
| trusty | ignored | end of standard support |
| trusty/esm | not-affected | code not present |
| upstream | released | 2.4.41-1 |
Показывать по
EPSS
6.4 Medium
CVSS2
9.1 Critical
CVSS3
Связанные уязвимости
In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the h ...
In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
Уязвимость реализации сетевого протокола HTTP/2 веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
6.4 Medium
CVSS2
9.1 Critical
CVSS3