Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:02565-1

Опубликовано: 31 июл. 2025
Источник: suse-cvrf

Описание

Security update for apache2

This update for apache2 fixes the following issues:

  • CVE-2024-42516: Fixed HTTP response splitting. (bsc#1246477)
  • CVE-2024-43204: Fixed a SSRF when mod_proxy is loaded that allows an attacker to send outbound proxy requests to a URL controlled by them. (bsc#1246305)
  • CVE-2024-47252: Fixed insufficient escaping of user-supplied data in mod_ssl allows an untrusted SSL/TLS client to insert escape characters into log file. (bsc#1246303)
  • CVE-2025-23048: Fixed access control bypass by trusted clients through TLS 1.3 session resumption in some mod_ssl configurations. (bsc#1246302)
  • CVE-2025-49630: Fixed denial of service can be triggered by untrusted clients causing an assertion in mod_proxy_http2. (bsc#1246307)
  • CVE-2025-49812: Fixed Opossum Attack Application Layer Desynchronization using Opportunistic TLS. (bsc#1246169)
  • CVE-2025-53020: Fixed HTTP/2 denial of service due to late release of memory after effective lifetime. (bsc#1246306)

Список пакетов

SUSE Linux Enterprise Server 12 SP5-LTSS
apache2-2.4.51-35.69.1
apache2-devel-2.4.51-35.69.1
apache2-doc-2.4.51-35.69.1
apache2-example-pages-2.4.51-35.69.1
apache2-prefork-2.4.51-35.69.1
apache2-tls13-2.4.51-35.69.1
apache2-tls13-devel-2.4.51-35.69.1
apache2-tls13-doc-2.4.51-35.69.1
apache2-tls13-example-pages-2.4.51-35.69.1
apache2-tls13-prefork-2.4.51-35.69.1
apache2-tls13-utils-2.4.51-35.69.1
apache2-tls13-worker-2.4.51-35.69.1
apache2-utils-2.4.51-35.69.1
apache2-worker-2.4.51-35.69.1
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5
apache2-2.4.51-35.69.1
apache2-devel-2.4.51-35.69.1
apache2-doc-2.4.51-35.69.1
apache2-example-pages-2.4.51-35.69.1
apache2-prefork-2.4.51-35.69.1
apache2-tls13-2.4.51-35.69.1
apache2-tls13-devel-2.4.51-35.69.1
apache2-tls13-doc-2.4.51-35.69.1
apache2-tls13-example-pages-2.4.51-35.69.1
apache2-tls13-prefork-2.4.51-35.69.1
apache2-tls13-utils-2.4.51-35.69.1
apache2-tls13-worker-2.4.51-35.69.1
apache2-utils-2.4.51-35.69.1
apache2-worker-2.4.51-35.69.1

Описание

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.69.1

Ссылки

Описание

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.69.1

Ссылки

Описание

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.69.1

Ссылки

Описание

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.69.1

Ссылки

Описание

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.69.1

Ссылки

Описание

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.69.1

Ссылки

Описание

Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server. This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63. Users are recommended to upgrade to version 2.4.64, which fixes the issue.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-devel-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-doc-2.4.51-35.69.1
SUSE Linux Enterprise Server 12 SP5-LTSS:apache2-example-pages-2.4.51-35.69.1

Ссылки