ALAS-2021-1514 --- httpd24ID: oval:org.secpod.oval:def:1601455 | Date: (C)2021-07-26 (M)2024-01-29 |
Class: PATCH | Family: unix |
A flaw was found in Apache httpd. The mod_proxy_wstunnel module tunnels non-upgraded connections. A flaw was found in HTTPd. In some Apache HTTP Server versions, unprivileged local users can stop HTTPd on Windows. The highest threat from this vulnerability is to system availability. A flaw was found In Apache httpd. The mod_proxy has a NULL pointer dereference. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. A flaw was found in Apache httpd. The mod_auth_digest has a single zero byte stack overflow. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. A NULL pointer dereference was found in Apache httpd mod_session. The highest threat from this vulnerability is to system availability. A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability. A flaw was found in Apache httpd. A possible regression from an earlier security fix broke behavior of MergeSlashes. The highest threat from this vulnerability is to data integrity
Platform: |
Amazon Linux AMI |
Product: |
httpd24 |
mod24_session |