QID 352477

Date Published: 2021-07-14

QID 352477: Amazon Linux Security Advisory for httpd24: ALAS-2021-1514

<DIV ID="issue_overview"> a flaw was found in apache httpd.
The mod_proxy_wstunnel module tunnels non-upgraded connections. (
cve-2019-17567 ) a flaw was found in httpd.
In some apache http server versions, unprivileged local users can stop httpd on windows.
The highest threat from this vulnerability is to system availability. (
cve-2020-13938 ) a flaw was found in apache httpd.
The mod_proxy has a null pointer dereference.
The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (
cve-2020-13950 ) a flaw was found in apache httpd.
The mod_auth_digest has a single zero byte stack overflow.
cve-2020-35452 ) a null pointer dereference was found in apache httpd mod_session.
cve-2021-26690 ) a heap overflow flaw was found in apache httpd mod_session.
cve-2021-26691 ) a flaw was found in apache httpd.
A possible regression from an earlier security fix broke behavior of mergeslashes.
The highest threat from this vulnerability is to data integrity. (
cve-2021-30641 ) </DIV>

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2021-1514 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2021-1514 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2021-1514.html