Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "apache2-ssl-dev": "2.4.29-1ubuntu4.14", "apache2-dbg": "2.4.29-1ubuntu4.14", "apache2-dev": "2.4.29-1ubuntu4.14", "apache2-bin": "2.4.29-1ubuntu4.14", "apache2-data": "2.4.29-1ubuntu4.14", "apache2-suexec-pristine": "2.4.29-1ubuntu4.14", "apache2-doc": "2.4.29-1ubuntu4.14", "apache2": "2.4.29-1ubuntu4.14", "apache2-utils": "2.4.29-1ubuntu4.14", "apache2-suexec-custom": "2.4.29-1ubuntu4.14" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "apache2-suexec-pristine-dbgsym": "2.4.41-4ubuntu3.1", "apache2-suexec-custom": "2.4.41-4ubuntu3.1", "apache2-dev": "2.4.41-4ubuntu3.1", "apache2-bin": "2.4.41-4ubuntu3.1", "apache2-suexec-pristine": "2.4.41-4ubuntu3.1", "apache2-doc": "2.4.41-4ubuntu3.1", "libapache2-mod-md": "2.4.41-4ubuntu3.1", "apache2": "2.4.41-4ubuntu3.1", "apache2-utils-dbgsym": "2.4.41-4ubuntu3.1", "apache2-data": "2.4.41-4ubuntu3.1", "libapache2-mod-proxy-uwsgi": "2.4.41-4ubuntu3.1", "apache2-suexec-custom-dbgsym": "2.4.41-4ubuntu3.1", "apache2-bin-dbgsym": "2.4.41-4ubuntu3.1", "apache2-utils": "2.4.41-4ubuntu3.1", "apache2-ssl-dev": "2.4.41-4ubuntu3.1" } ] }