CVE Vulnerabilities

CVE-2024-36387

NULL Pointer Dereference

Published: Jul 01, 2024 | Modified: Nov 06, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
3.7 LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
Http_serverApache2.4.55 (including)2.4.59 (including)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_http2-0:2.0.29-3.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_http2-0:2.0.29-3.el7jbcs*
Red Hat Enterprise Linux 9RedHatmod_http2-0:2.0.26-2.el9_4.1*
Red Hat JBoss Core Services 2.4.62RedHatmod_http2*
Apache2Ubuntudevel*
Apache2Ubuntuesm-infra/focal*
Apache2Ubuntufocal*
Apache2Ubuntujammy*
Apache2Ubuntumantic*
Apache2Ubuntunoble*
Apache2Ubuntuoracular*
Apache2Ubuntuupstream*

Potential Mitigations

References