A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "apache2",
"binary_version": "2.4.29-1ubuntu4.6"
},
{
"binary_name": "apache2-bin",
"binary_version": "2.4.29-1ubuntu4.6"
},
{
"binary_name": "apache2-data",
"binary_version": "2.4.29-1ubuntu4.6"
},
{
"binary_name": "apache2-dev",
"binary_version": "2.4.29-1ubuntu4.6"
},
{
"binary_name": "apache2-ssl-dev",
"binary_version": "2.4.29-1ubuntu4.6"
},
{
"binary_name": "apache2-suexec-custom",
"binary_version": "2.4.29-1ubuntu4.6"
},
{
"binary_name": "apache2-suexec-pristine",
"binary_version": "2.4.29-1ubuntu4.6"
},
{
"binary_name": "apache2-utils",
"binary_version": "2.4.29-1ubuntu4.6"
}
]
}