摘要:
httpd security update
安全等级: Critical
公告ID: KylinSec-SA-2025-2880
发布日期: 2025年9月26日
关联CVE: CVE-2024-42516 CVE-2024-43204 CVE-2024-47252 CVE-2025-23048 CVE-2025-49812
Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.
Security Fix(es):
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.
This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.
Users are recommended to upgrade to version 2.4.64, which fixes this issue.(CVE-2024-42516)
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.
Users are recommended to upgrade to version 2.4.64 which fixes this issue.(CVE-2024-43204)
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.
In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.(CVE-2024-47252)
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.
Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.(CVE-2025-23048)
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.
Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.(CVE-2025-49812)
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2024-42516 | V6 | httpd | Fixed |
CVE-2024-43204 | V6 | httpd | Fixed |
CVE-2024-47252 | V6 | httpd | Fixed |
CVE-2025-23048 | V6 | httpd | Fixed |
CVE-2025-49812 | V6 | httpd | Fixed |
软件名称 | 架构 | 版本号 |
---|---|---|
httpd-filesystem | noarch | 2.4.58-10.ks6.kb1 |
httpd-help | noarch | 2.4.58-10.ks6.kb1 |
httpd | x86_64 | 2.4.58-10.ks6.kb1 |
httpd-devel | x86_64 | 2.4.58-10.ks6.kb1 |
httpd-tools | x86_64 | 2.4.58-10.ks6.kb1 |
mod_ldap | x86_64 | 2.4.58-10.ks6.kb1 |
mod_md | x86_64 | 2.4.58-10.ks6.kb1 |
mod_proxy_html | x86_64 | 2.4.58-10.ks6.kb1 |
mod_session | x86_64 | 2.4.58-10.ks6.kb1 |
mod_ssl | x86_64 | 2.4.58-10.ks6.kb1 |
httpd | aarch64 | 2.4.58-10.ks6.kb1 |
httpd-devel | aarch64 | 2.4.58-10.ks6.kb1 |
httpd-tools | aarch64 | 2.4.58-10.ks6.kb1 |
mod_ldap | aarch64 | 2.4.58-10.ks6.kb1 |
mod_md | aarch64 | 2.4.58-10.ks6.kb1 |
mod_proxy_html | aarch64 | 2.4.58-10.ks6.kb1 |
mod_session | aarch64 | 2.4.58-10.ks6.kb1 |
mod_ssl | aarch64 | 2.4.58-10.ks6.kb1 |
方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm
方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名