CVE-2019-10097

Priority
Description
In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to
use a trusted intermediary proxy server using the "PROXY" protocol, a
specially crafted PROXY header could trigger a stack buffer overflow or
NULL pointer deference. This vulnerability could only be triggered by a
trusted proxy and not by untrusted HTTP clients.
Notes
sbeattieapache 2.4.33 through 2.4.42 (pending)
Package
Upstream:released (2.4.41-1)
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Patches:
Upstream:https://github.com/apache/httpd/commit/6e2cd6b5efdc9d02b0eb7834ffddee7ed06ba6a6
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. For more details see https://wiki.ubuntu.com/Security/Features#stack-protector
More Information

Updated: 2020-07-28 20:05:55 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)