Description
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4757-1 | apache2 security update |
Ubuntu USN |
USN-4458-1 | Apache HTTP Server vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Netapp
Subscribe
Clustered Data Ontap
Subscribe
Opensuse
Subscribe
Leap
Subscribe
Oracle
Subscribe
Communications Element Manager
Subscribe
Communications Session Report Manager
Subscribe
Communications Session Route Manager
Subscribe
Enterprise Manager Ops Center
Subscribe
Hyperion Infrastructure Technology
Subscribe
Instantis Enterprisetrack
Subscribe
Zfs Storage Appliance Kit
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T11:48:57.265Z
Reserved: 2020-04-21T00:00:00.000Z
Link: CVE-2020-11993
No data.
Status : Analyzed
Published: 2020-08-07T16:15:11.887
Modified: 2025-05-01T15:40:19.830
Link: CVE-2020-11993
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN