• 公告ID (KylinSec-SA-2025-2880)

摘要:

httpd security update

安全等级: Critical

公告ID: KylinSec-SA-2025-2880

发布日期: 2025年9月26日

关联CVE: CVE-2024-42516   CVE-2024-43204   CVE-2024-47252   CVE-2025-23048   CVE-2025-49812  

  • 详细介绍

1. 漏洞描述

   

Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.

Security Fix(es):

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.

This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.

Users are recommended to upgrade to version 2.4.64, which fixes this issue.(CVE-2024-42516)

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.

Users are recommended to upgrade to version 2.4.64 which fixes this issue.(CVE-2024-43204)

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.

In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.(CVE-2024-47252)

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.

Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.(CVE-2025-23048)

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.

Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.(CVE-2025-49812)

2. 影响范围

cve名称 产品 组件 是否受影响
CVE-2024-42516 V6 httpd Fixed
CVE-2024-43204 V6 httpd Fixed
CVE-2024-47252 V6 httpd Fixed
CVE-2025-23048 V6 httpd Fixed
CVE-2025-49812 V6 httpd Fixed

3. 影响组件

    httpd

4. 修复版本

   

V6

软件名称 架构 版本号
httpd-filesystem noarch 2.4.58-10.ks6.kb1
httpd-help noarch 2.4.58-10.ks6.kb1
httpd x86_64 2.4.58-10.ks6.kb1
httpd-devel x86_64 2.4.58-10.ks6.kb1
httpd-tools x86_64 2.4.58-10.ks6.kb1
mod_ldap x86_64 2.4.58-10.ks6.kb1
mod_md x86_64 2.4.58-10.ks6.kb1
mod_proxy_html x86_64 2.4.58-10.ks6.kb1
mod_session x86_64 2.4.58-10.ks6.kb1
mod_ssl x86_64 2.4.58-10.ks6.kb1
httpd aarch64 2.4.58-10.ks6.kb1
httpd-devel aarch64 2.4.58-10.ks6.kb1
httpd-tools aarch64 2.4.58-10.ks6.kb1
mod_ldap aarch64 2.4.58-10.ks6.kb1
mod_md aarch64 2.4.58-10.ks6.kb1
mod_proxy_html aarch64 2.4.58-10.ks6.kb1
mod_session aarch64 2.4.58-10.ks6.kb1
mod_ssl aarch64 2.4.58-10.ks6.kb1

5. 修复方法


方法一:下载安装包进行升级安装
1、通过下载链接下载需要升级的升级包保存,如 xxx.rpm
2、通过rpm命令升级,如 rpm -Uvh xxx.rpm

方法二:通过软件源进行升级安装
1、保持能够连接上互联网
2、通过yum命令升级指定的包,如 yum install 包名

6. 下载链接

   

V6:

x86_64:

     httpd-filesystem   

     httpd-help   

     httpd   

     httpd-devel   

     httpd-tools   

     mod_ldap   

     mod_md   

     mod_proxy_html   

     mod_session   

     mod_ssl   

aarch64:

     httpd-filesystem   

     httpd-help   

     httpd   

     httpd-devel   

     httpd-tools   

     mod_ldap   

     mod_md   

     mod_proxy_html   

     mod_session   

     mod_ssl   

上一篇:KylinSec-SA-2025-2877 下一篇:KylinSec-SA-2025-2885