apache2: CVE-2021-31618: NULL pointer dereference on specially crafted HTTP/2 request

Related Vulnerabilities: CVE-2021-31618  

Debian Bug report logs - #989562
apache2: CVE-2021-31618: NULL pointer dereference on specially crafted HTTP/2 request

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Mon, 7 Jun 2021 15:39:02 UTC

Severity: grave

Tags: security, upstream

Found in version apache2/2.4.47-1

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Debian Apache Maintainers <debian-apache@lists.debian.org>:
Bug#989562; Package src:apache2. (Mon, 07 Jun 2021 15:39:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Debian Apache Maintainers <debian-apache@lists.debian.org>. (Mon, 07 Jun 2021 15:39:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: apache2: CVE-2021-31618: NULL pointer dereference on specially crafted HTTP/2 request
Date: Mon, 07 Jun 2021 17:34:53 +0200
Source: apache2
Version: 2.4.47-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>

Hi,

The following vulnerability was published for apache2.

CVE-2021-31618[0]:
| httpd: NULL pointer dereference on specially crafted HTTP/2 request

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-31618
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
[1] https://github.com/apache/httpd/commit/a4fba223668c554e06bc78d6e3a88f33d4238ae4
[2] https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-31618

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Apache Maintainers <debian-apache@lists.debian.org>:
Bug#989562; Package src:apache2. (Tue, 08 Jun 2021 06:06:02 GMT) (full text, mbox, link).


Acknowledgement sent to Yadd <yadd@debian.org>:
Extra info received and forwarded to list. Copy sent to Debian Apache Maintainers <debian-apache@lists.debian.org>. (Tue, 08 Jun 2021 06:06:02 GMT) (full text, mbox, link).


Message #10 received at 989562@bugs.debian.org (full text, mbox, reply):

From: Yadd <yadd@debian.org>
To: Salvatore Bonaccorso <carnil@debian.org>, 989562@bugs.debian.org
Subject: Re: Bug#989562: apache2: CVE-2021-31618: NULL pointer dereference on specially crafted HTTP/2 request
Date: Tue, 8 Jun 2021 07:58:45 +0200
[Message part 1 (text/plain, inline)]
Le 07/06/2021 à 17:34, Salvatore Bonaccorso a écrit :
> Source: apache2
> Version: 2.4.47-1
> Severity: grave
> Tags: security upstream
> Justification: user security hole
> X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
> 
> Hi,
> 
> The following vulnerability was published for apache2.
> 
> CVE-2021-31618[0]:
> | httpd: NULL pointer dereference on specially crafted HTTP/2 request
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2021-31618
>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
> [1] https://github.com/apache/httpd/commit/a4fba223668c554e06bc78d6e3a88f33d4238ae4
> [2] https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-31618
> 
> Please adjust the affected versions in the BTS as needed.
> 
> Regards,
> Salvatore

Hi all,

I can't import the whole patch for Bullseye since it is written for
2.4.47. I think the best solution is to import the whole http2 module in
Bullseye. This gives the attached patch

Cheers,
Yadd
[import-http2-module-from-2.4.47.patch (text/x-patch, attachment)]

Information forwarded to debian-bugs-dist@lists.debian.org, Debian Apache Maintainers <debian-apache@lists.debian.org>:
Bug#989562; Package src:apache2. (Tue, 08 Jun 2021 06:27:05 GMT) (full text, mbox, link).


Acknowledgement sent to 989562@bugs.debian.org:
Extra info received and forwarded to list. Copy sent to Debian Apache Maintainers <debian-apache@lists.debian.org>. (Tue, 08 Jun 2021 06:27:05 GMT) (full text, mbox, link).


Message #15 received at 989562@bugs.debian.org (full text, mbox, reply):

From: Yadd <yadd@debian.org>
To: Salvatore Bonaccorso <carnil@debian.org>, 989562@bugs.debian.org
Subject: Re: Bug#989562: apache2: CVE-2021-31618: NULL pointer dereference on specially crafted HTTP/2 request
Date: Tue, 8 Jun 2021 08:25:41 +0200
[Message part 1 (text/plain, inline)]
Le 08/06/2021 à 07:58, Yadd a écrit :
> Le 07/06/2021 à 17:34, Salvatore Bonaccorso a écrit :
>> Source: apache2
>> Version: 2.4.47-1
>> Severity: grave
>> Tags: security upstream
>> Justification: user security hole
>> X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
>>
>> Hi,
>>
>> The following vulnerability was published for apache2.
>>
>> CVE-2021-31618[0]:
>> | httpd: NULL pointer dereference on specially crafted HTTP/2 request
>>
>> If you fix the vulnerability please also make sure to include the
>> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
>>
>> For further information see:
>>
>> [0] https://security-tracker.debian.org/tracker/CVE-2021-31618
>>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
>> [1] https://github.com/apache/httpd/commit/a4fba223668c554e06bc78d6e3a88f33d4238ae4
>> [2] https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-31618
>>
>> Please adjust the affected versions in the BTS as needed.
>>
>> Regards,
>> Salvatore
> 
> Hi all,
> 
> I can't import the whole patch for Bullseye since it is written for
> 2.4.47. I think the best solution is to import the whole http2 module in
> Bullseye. This gives the attached patch
> 
> Cheers,
> Yadd

We can also fix this for Buster using the same way (we did it previously
for 2.4.46). Here is the debdiff
[apache2_2.4.38-3+deb10u5.debdiff (text/plain, attachment)]

Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#989562. (Tue, 08 Jun 2021 06:36:02 GMT) (full text, mbox, link).


Message #18 received at 989562-submitter@bugs.debian.org (full text, mbox, reply):

From: Yadd <noreply@salsa.debian.org>
To: 989562-submitter@bugs.debian.org
Subject: Bug#989562 marked as pending in apache2
Date: Tue, 08 Jun 2021 06:33:03 +0000
Control: tag -1 pending

Hello,

Bug #989562 in apache2 reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/apache-team/apache2/-/commit/e658ca2ee7f09e8f4dd0199f47af20756f90a6ff

------------------------------------------------------------------------
Import the whole HTTP2 module from 2.4.47 (Closes: #989562, CVE-2021-31618)
------------------------------------------------------------------------

(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/989562



Added tag(s) pending. Request was from Yadd <noreply@salsa.debian.org> to 989562-submitter@bugs.debian.org. (Tue, 08 Jun 2021 06:36:02 GMT) (full text, mbox, link).


Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#989562. (Tue, 08 Jun 2021 08:51:03 GMT) (full text, mbox, link).


Message #23 received at 989562-submitter@bugs.debian.org (full text, mbox, reply):

From: Yadd <noreply@salsa.debian.org>
To: 989562-submitter@bugs.debian.org
Subject: Bug#989562 marked as pending in apache2
Date: Tue, 08 Jun 2021 08:46:35 +0000
Control: tag -1 pending

Hello,

Bug #989562 in apache2 reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/apache-team/apache2/-/commit/77aadf7b7d4f28684d9ddf97f447719245737090

------------------------------------------------------------------------
Import the whole HTTP2 module from 2.4.48 (Closes: #989562, CVE-2021-31618)

x
------------------------------------------------------------------------

(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/989562



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Apache Maintainers <debian-apache@lists.debian.org>:
Bug#989562; Package src:apache2. (Tue, 08 Jun 2021 08:54:02 GMT) (full text, mbox, link).


Acknowledgement sent to 989562@bugs.debian.org:
Extra info received and forwarded to list. Copy sent to Debian Apache Maintainers <debian-apache@lists.debian.org>. (Tue, 08 Jun 2021 08:54:02 GMT) (full text, mbox, link).


Message #28 received at 989562@bugs.debian.org (full text, mbox, reply):

From: Yadd <yadd@debian.org>
To: Salvatore Bonaccorso <carnil@debian.org>, 989562@bugs.debian.org
Subject: Re: Bug#989562: apache2: CVE-2021-31618: NULL pointer dereference on specially crafted HTTP/2 request
Date: Tue, 8 Jun 2021 10:51:58 +0200
[Message part 1 (text/plain, inline)]
Le 08/06/2021 à 08:25, Yadd a écrit :
> Le 08/06/2021 à 07:58, Yadd a écrit :
>> Le 07/06/2021 à 17:34, Salvatore Bonaccorso a écrit :
>>> Source: apache2
>>> Version: 2.4.47-1
>>> Severity: grave
>>> Tags: security upstream
>>> Justification: user security hole
>>> X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
>>>
>>> Hi,
>>>
>>> The following vulnerability was published for apache2.
>>>
>>> CVE-2021-31618[0]:
>>> | httpd: NULL pointer dereference on specially crafted HTTP/2 request
>>>
>>> If you fix the vulnerability please also make sure to include the
>>> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
>>>
>>> For further information see:
>>>
>>> [0] https://security-tracker.debian.org/tracker/CVE-2021-31618
>>>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
>>> [1] https://github.com/apache/httpd/commit/a4fba223668c554e06bc78d6e3a88f33d4238ae4
>>> [2] https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-31618
>>>
>>> Please adjust the affected versions in the BTS as needed.
>>>
>>> Regards,
>>> Salvatore
>>
>> Hi all,
>>
>> I can't import the whole patch for Bullseye since it is written for
>> 2.4.47. I think the best solution is to import the whole http2 module in
>> Bullseye. This gives the attached patch
>>
>> Cheers,
>> Yadd
> 
> We can also fix this for Buster using the same way (we did it previously
> for 2.4.46). Here is the debdiff

Update for Buster
[apache2_2.4.38-3+deb10u5.debdiff (text/plain, attachment)]

Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#989562. (Tue, 08 Jun 2021 08:54:03 GMT) (full text, mbox, link).


Message #31 received at 989562-submitter@bugs.debian.org (full text, mbox, reply):

From: Yadd <noreply@salsa.debian.org>
To: 989562-submitter@bugs.debian.org
Subject: Bug#989562 marked as pending in apache2
Date: Tue, 08 Jun 2021 08:50:40 +0000
Control: tag -1 pending

Hello,

Bug #989562 in apache2 reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/apache-team/apache2/-/commit/c5a0d72e842f8d2763a2e12ff48a94b6b12383fe

------------------------------------------------------------------------
Import the whole HTTP2 module from 2.4.48 (Closes: #989562, CVE-2021-31618)
------------------------------------------------------------------------

(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/989562



Information forwarded to debian-bugs-dist@lists.debian.org, Debian Apache Maintainers <debian-apache@lists.debian.org>:
Bug#989562; Package src:apache2. (Tue, 08 Jun 2021 10:15:04 GMT) (full text, mbox, link).


Acknowledgement sent to 989562@bugs.debian.org:
Extra info received and forwarded to list. Copy sent to Debian Apache Maintainers <debian-apache@lists.debian.org>. (Tue, 08 Jun 2021 10:15:04 GMT) (full text, mbox, link).


Message #36 received at 989562@bugs.debian.org (full text, mbox, reply):

From: Yadd <yadd@debian.org>
To: 989562@bugs.debian.org, Debian Security Team <team@security.debian.org>
Subject: Re: Bug#989562: apache2: CVE-2021-31618: NULL pointer dereference on specially crafted HTTP/2 request
Date: Tue, 8 Jun 2021 12:10:39 +0200
Le 08/06/2021 à 10:51, Yadd a écrit :
> Le 08/06/2021 à 08:25, Yadd a écrit :
>> Le 08/06/2021 à 07:58, Yadd a écrit :
>>> Le 07/06/2021 à 17:34, Salvatore Bonaccorso a écrit :
>>>> Source: apache2
>>>> Version: 2.4.47-1
>>>> Severity: grave
>>>> Tags: security upstream
>>>> Justification: user security hole
>>>> X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
>>>>
>>>> Hi,
>>>>
>>>> The following vulnerability was published for apache2.
>>>>
>>>> CVE-2021-31618[0]:
>>>> | httpd: NULL pointer dereference on specially crafted HTTP/2 request
>>>>
>>>> If you fix the vulnerability please also make sure to include the
>>>> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
>>>>
>>>> For further information see:
>>>>
>>>> [0] https://security-tracker.debian.org/tracker/CVE-2021-31618
>>>>     https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31618
>>>> [1] https://github.com/apache/httpd/commit/a4fba223668c554e06bc78d6e3a88f33d4238ae4
>>>> [2] https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-31618
>>>>
>>>> Please adjust the affected versions in the BTS as needed.
>>>>
>>>> Regards,
>>>> Salvatore
>>>
>>> Hi all,
>>>
>>> I can't import the whole patch for Bullseye since it is written for
>>> 2.4.47. I think the best solution is to import the whole http2 module in
>>> Bullseye. This gives the attached patch
>>>
>>> Cheers,
>>> Yadd
>>
>> We can also fix this for Buster using the same way (we did it previously
>> for 2.4.46). Here is the debdiff
> 
> Update for Buster

I as wrong for both Bullseye and Buster: we can't import HTTP2 from
2.4.28 (too intrusive: SSL stack changed)

So I'll try to patch Apache but it seems not easy to do...

Cheers (and sorry),
Yadd



Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#989562. (Tue, 08 Jun 2021 10:15:06 GMT) (full text, mbox, link).


Message #39 received at 989562-submitter@bugs.debian.org (full text, mbox, reply):

From: Yadd <noreply@salsa.debian.org>
To: 989562-submitter@bugs.debian.org
Subject: Bug#989562 marked as pending in apache2
Date: Tue, 08 Jun 2021 10:12:48 +0000
Control: tag -1 pending

Hello,

Bug #989562 in apache2 reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/apache-team/apache2/-/commit/822d703bc5a74b79367f8b0b6ecf2d32e7fc1fe2

------------------------------------------------------------------------
Revert "Import the whole HTTP2 module from 2.4.48 (Closes: #989562, CVE-2021-31618)"

This reverts commit c5a0d72e842f8d2763a2e12ff48a94b6b12383fe.
------------------------------------------------------------------------

(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/989562



Message sent on to Salvatore Bonaccorso <carnil@debian.org>:
Bug#989562. (Tue, 08 Jun 2021 10:15:07 GMT) (full text, mbox, link).


Message #42 received at 989562-submitter@bugs.debian.org (full text, mbox, reply):

From: Yadd <noreply@salsa.debian.org>
To: 989562-submitter@bugs.debian.org
Subject: Bug#989562 marked as pending in apache2
Date: Tue, 08 Jun 2021 10:13:22 +0000
Control: tag -1 pending

Hello,

Bug #989562 in apache2 reported by you has been fixed in the
Git repository and is awaiting an upload. You can see the commit
message below and you can check the diff of the fix at:

https://salsa.debian.org/apache-team/apache2/-/commit/6a41612e278bcedd0b1be1bb4bfe5d757b5bc8c3

------------------------------------------------------------------------
Revert "Import the whole HTTP2 module from 2.4.48 (Closes: #989562, CVE-2021-31618)"

This reverts commit 77aadf7b7d4f28684d9ddf97f447719245737090.
------------------------------------------------------------------------

(this message was generated automatically)
-- 
Greetings

https://bugs.debian.org/989562



Removed tag(s) pending. Request was from Yadd <yadd@debian.org> to control@bugs.debian.org. (Tue, 08 Jun 2021 10:27:09 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Tue Jun 8 16:13:34 2021; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.