|
|
Subscribe / Log in / New account

Ubuntu alert USN-7639-1 (apache2)

From:  noreply+usn-bot@canonical.com
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7639-1] Apache HTTP Server vulnerabilities
Date:  Wed, 16 Jul 2025 20:03:11 +0000
Message-ID:  <E1uc8LP-0006t6-MH@lists.ubuntu.com>

========================================================================== Ubuntu Security Notice USN-7639-1 July 16, 2025 apache2 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 25.04 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS Summary: Several security issues were fixed in Apache HTTP Server. Software Description: - apache2: Apache HTTP server Details: It was discovered that the Apache HTTP Server incorrectly handled certain Content-Type response headers. A remote attacker could possibly use this issue to perform HTTP response splitting attacks. (CVE-2024-42516) xiaojunjie discovered that the Apache HTTP Server mod_proxy module incorrectly handled certain requests. A remote attacker could possibly use this issue to send outbound proxy requests to an arbitrary URL. (CVE-2024-43204) John Runyon discovered that the Apache HTTP Server mod_ssl module incorrectly escaped certain data. A remote attacker could possibly use this issue to insert escape characters into log files. (CVE-2024-47252) Sven Hebrok, Felix Cramer, Tim Storm, Maximilian Radoy, and Juraj Somorovsky discovered that the Apache HTTP Server mod_ssl module incorrectly handled TLS 1.3 session resumption. A remote attacker could possibly use this issue to bypass access control. (CVE-2025-23048) Anthony CORSIEZ discovered that the Apache HTTP Server mod_proxy_http2 module incorrectly handled missing host headers. A remote attacker could possibly use this issue to cause the server to crash, resulting in a denial of service. (CVE-2025-49630) Robert Merget discovered that the Apache HTTP Server mod_ssl module incorrectly handled TLS upgrades. A remote attacker could possibly use this issue to hijack an HTTP session. This update removes the old "SSLEngine optional" configuration option, possibly requiring a configuration change in certain environments. (CVE-2025-49812) Gal Bar Nahum discovered that the Apache HTTP Server incorrectly handled certain memory operations. A remote attacker could possibly use this issue to cause the server to consume resources, leading to a denial of service. (CVE-2025-53020) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 25.04 apache2 2.4.63-1ubuntu1.1 Ubuntu 24.04 LTS apache2 2.4.58-1ubuntu8.7 Ubuntu 22.04 LTS apache2 2.4.52-1ubuntu4.15 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7639-1 CVE-2024-42516, CVE-2024-43204, CVE-2024-47252, CVE-2025-23048, CVE-2025-49630, CVE-2025-49812, CVE-2025-53020 Package Information: https://launchpad.net/ubuntu/+source/apache2/2.4.63-1ubun... https://launchpad.net/ubuntu/+source/apache2/2.4.58-1ubun... https://launchpad.net/ubuntu/+source/apache2/2.4.52-1ubun...


Attachment: signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- iQIzBAABCgAdFiEE+8neBLO2Hp/ppPlOcpJm3tlzhgEFAmh4BWYACgkQcpJm3tlz hgFpyA/6ArI+xiSub3WnPuh7guNlMOH1N95RnLcBLXAaoZl4R0ajC41u+qV9pan7 mB//H9Hl3bNqTwxwy1UuBbL7uHHSEOOlBkUSSJyXYdgVMGbqFFxHJcrIYShdawzU QVhHu7B9SEKHxDfhpQapfUDBA4IaVo/34HPkS9UfBMXJK0c9fXMZ8yaojfVdNqtC 16ms8gkRUAo27EyWFwWlUI29d4XnQanrdFCY73IuTL4ysDaGGWPRnoUdVLZ50s5U K6NQrdACimxKa/eb6RGaaqg94S3fES+pMw6wLtDMHuIO/Xz6Ts1yCyWD3JeA+4Zt E0mkfAKf25YApUeERXZCxbxuBGpzUwFtWkcValkBDiWZsTVmTMsWMI/sDajnQ5l3 QwCFln43ehGKZO0Mx9ZmYGFZYqtuXR/7+Ea/C1SyYFni3hMqRLzFT1aWFt0QQfeh mYWNMJ88tNTjHIx0ExE2axtMdmsfF103GR4cbImFjIVo5xhY7fAUbTFtf55GCPqu WOY8qntQFxipDFOw0DwzjViuO476J+Lw9WxVMXLVRouAgPjpVRAK+iypdn+5Ynav 00PcmvFrtn9aTeqhbCmCskzo0LYsIrcgNCXDms1RQXB1njro1XFa2U9b+GNzjBGi KaCGvCUdMM5VF/ykdx28sOltDzLcVMa8ygb3YluYW5UsvS0WufA= =TCUw -----END PGP SIGNATURE-----


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds