Amazon Linux 2 Security Advisory: ALAS2-2025-2958
Advisory Released Date: 2025-08-04
Advisory Updated Date: 2025-08-04
FAQs regarding Amazon Linux ALAS/CVE Severity
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.
This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.
Users are recommended to upgrade to version 2.4.64, which fixes this issue. (CVE-2024-42516)
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.
Users are recommended to upgrade to version 2.4.64 which fixes this issue. (CVE-2024-43204)
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.
In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files. (CVE-2024-47252)
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.
Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host. (CVE-2025-23048)
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2.
Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on". (CVE-2025-49630)
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.
Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade. (CVE-2025-49812)
Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server.
This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63.
Users are recommended to upgrade to version 2.4.64, which fixes the issue. (CVE-2025-53020)
Affected Packages:
httpd
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update httpd or yum update --advisory ALAS2-2025-2958 to update your system.
aarch64:
httpd-2.4.64-1.amzn2.0.1.aarch64
httpd-devel-2.4.64-1.amzn2.0.1.aarch64
httpd-tools-2.4.64-1.amzn2.0.1.aarch64
mod_ssl-2.4.64-1.amzn2.0.1.aarch64
mod_md-2.4.64-1.amzn2.0.1.aarch64
mod_proxy_html-2.4.64-1.amzn2.0.1.aarch64
mod_ldap-2.4.64-1.amzn2.0.1.aarch64
mod_session-2.4.64-1.amzn2.0.1.aarch64
httpd-debuginfo-2.4.64-1.amzn2.0.1.aarch64
i686:
httpd-2.4.64-1.amzn2.0.1.i686
httpd-devel-2.4.64-1.amzn2.0.1.i686
httpd-tools-2.4.64-1.amzn2.0.1.i686
mod_ssl-2.4.64-1.amzn2.0.1.i686
mod_md-2.4.64-1.amzn2.0.1.i686
mod_proxy_html-2.4.64-1.amzn2.0.1.i686
mod_ldap-2.4.64-1.amzn2.0.1.i686
mod_session-2.4.64-1.amzn2.0.1.i686
httpd-debuginfo-2.4.64-1.amzn2.0.1.i686
noarch:
httpd-manual-2.4.64-1.amzn2.0.1.noarch
httpd-filesystem-2.4.64-1.amzn2.0.1.noarch
src:
httpd-2.4.64-1.amzn2.0.1.src
x86_64:
httpd-2.4.64-1.amzn2.0.1.x86_64
httpd-devel-2.4.64-1.amzn2.0.1.x86_64
httpd-tools-2.4.64-1.amzn2.0.1.x86_64
mod_ssl-2.4.64-1.amzn2.0.1.x86_64
mod_md-2.4.64-1.amzn2.0.1.x86_64
mod_proxy_html-2.4.64-1.amzn2.0.1.x86_64
mod_ldap-2.4.64-1.amzn2.0.1.x86_64
mod_session-2.4.64-1.amzn2.0.1.x86_64
httpd-debuginfo-2.4.64-1.amzn2.0.1.x86_64