CVE-2019-10097

Priority
Description
In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to
use a trusted intermediary proxy server using the "PROXY" protocol, a
specially crafted PROXY header could trigger a stack buffer overflow or
NULL pointer deference. This vulnerability could only be triggered by a
trusted proxy and not by untrusted HTTP clients.
Notes
sbeattieapache 2.4.33 through 2.4.42 (pending)
Package
Upstream:released (2.4.41-1)
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 19.10 (Eoan Ermine):not-affected (2.4.41-1ubuntu1)
Patches:
Upstream:https://github.com/apache/httpd/commit/6e2cd6b5efdc9d02b0eb7834ffddee7ed06ba6a6
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. For more details see https://wiki.ubuntu.com/Security/Features#stack-protector
More Information

Updated: 2020-01-29 20:04:16 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)