OESA-2025-2172

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2172
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2172.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2025-2172
Upstream
Published
2025-09-05T12:43:10Z
Modified
2025-09-05T13:18:03.333771Z
Summary
httpd security update
Details

Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.

Security Fix(es):

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.

This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.

Users are recommended to upgrade to version 2.4.64, which fixes this issue.(CVE-2024-42516)

SSRF in Apache HTTP Server with modproxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where modheaders is configured to modify the Content-Type request or response header with a value provided in the HTTP request.

Users are recommended to upgrade to version 2.4.64 which fixes this issue.(CVE-2024-43204)

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.

In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by modssl such as SSLTLSSNI, no escaping is performed by either modlogconfig or modssl and unsanitized data provided by the client may appear in log files.(CVE-2024-47252)

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.

Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.(CVE-2025-23048)

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.

Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.(CVE-2025-49812)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:24.03-LTS-SP2 / httpd

Package

Name
httpd
Purl
pkg:rpm/openEuler/httpd&distro=openEuler-24.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.58-10.oe2403sp2

Ecosystem specific

{
    "aarch64": [
        "httpd-2.4.58-10.oe2403sp2.aarch64.rpm",
        "httpd-debuginfo-2.4.58-10.oe2403sp2.aarch64.rpm",
        "httpd-debugsource-2.4.58-10.oe2403sp2.aarch64.rpm",
        "httpd-devel-2.4.58-10.oe2403sp2.aarch64.rpm",
        "httpd-tools-2.4.58-10.oe2403sp2.aarch64.rpm",
        "mod_ldap-2.4.58-10.oe2403sp2.aarch64.rpm",
        "mod_md-2.4.58-10.oe2403sp2.aarch64.rpm",
        "mod_proxy_html-2.4.58-10.oe2403sp2.aarch64.rpm",
        "mod_session-2.4.58-10.oe2403sp2.aarch64.rpm",
        "mod_ssl-2.4.58-10.oe2403sp2.aarch64.rpm"
    ],
    "src": [
        "httpd-2.4.58-10.oe2403sp2.src.rpm"
    ],
    "x86_64": [
        "httpd-2.4.58-10.oe2403sp2.x86_64.rpm",
        "httpd-debuginfo-2.4.58-10.oe2403sp2.x86_64.rpm",
        "httpd-debugsource-2.4.58-10.oe2403sp2.x86_64.rpm",
        "httpd-devel-2.4.58-10.oe2403sp2.x86_64.rpm",
        "httpd-tools-2.4.58-10.oe2403sp2.x86_64.rpm",
        "mod_ldap-2.4.58-10.oe2403sp2.x86_64.rpm",
        "mod_md-2.4.58-10.oe2403sp2.x86_64.rpm",
        "mod_proxy_html-2.4.58-10.oe2403sp2.x86_64.rpm",
        "mod_session-2.4.58-10.oe2403sp2.x86_64.rpm",
        "mod_ssl-2.4.58-10.oe2403sp2.x86_64.rpm"
    ],
    "noarch": [
        "httpd-filesystem-2.4.58-10.oe2403sp2.noarch.rpm",
        "httpd-help-2.4.58-10.oe2403sp2.noarch.rpm"
    ]
}