A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.debian.org/security/2019/dsa-4422
https://usn.ubuntu.com/3937-1/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03950en_us
https://support.f5.com/csp/article/K44591505
https://security.netapp.com/advisory/ntap-20190617-0002/
https://seclists.org/bugtraq/2019/Apr/5
https://httpd.apache.org/security/vulnerabilities_24.html
https://access.redhat.com/errata/RHSA-2019:3935
https://access.redhat.com/errata/RHSA-2019:3933
https://access.redhat.com/errata/RHSA-2019:3932
http://www.securityfocus.com/bid/107669
http://www.openwall.com/lists/oss-security/2019/04/02/1
http://www.apache.org/dist/httpd/CHANGES_2.4.39
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00061.html
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00051.html