Fedora 26 : mod_http2 (2018-63de5f3f6b)

Medium Nessus Plugin ID 109417


The remote Fedora host is missing a security update.


This release includes the latest stable upstream release of mod_http2.
The changes since the last update are :

- fixes a race condition where aborting streams triggers an unnecessary timeout.

- accurate reporting of h2 data input/output per request via mod_logio. Fixes an issue where output sizes where counted n-times on reused slave connections. See [issue #158](https://github.com/icing/mod_h2/issues/158).

- normalized connection prefix logging when trace2 is enabled for direct h2 connection detection.


This update includes the latest upstream release of mod_http2, version 1.10.16. This includes a security fix (CVE-2018-1302) :

When an HTTP/2 stream was destroyed after being handled, mod_http2 could have written a NULL pointer potentially to an already freed memory.

The memory pools maintained by the server make this vulnerabilty hard to trigger in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected mod_http2 package.

See Also


Plugin Details

Severity: Medium

ID: 109417

File Name: fedora_2018-63de5f3f6b.nasl

Version: 1.6

Type: local

Agent: unix

Published: 2018/04/30

Updated: 2020/06/04

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS v3.0

Base Score: 5.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:mod_http2, cpe:/o:fedoraproject:fedora:26

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2018/04/27

Vulnerability Publication Date: 2018/03/26

Reference Information

CVE: CVE-2018-1302