Amazon Linux 2023 Security Advisory: ALAS2023-2025-1125
Advisory Released Date: 2025-08-08
Advisory Updated Date: 2025-08-08
FAQs regarding Amazon Linux ALAS/CVE Severity
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.
This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.
Users are recommended to upgrade to version 2.4.64, which fixes this issue. (CVE-2024-42516)
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.
Users are recommended to upgrade to version 2.4.64 which fixes this issue. (CVE-2024-43204)
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.
In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files. (CVE-2024-47252)
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.
Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host. (CVE-2025-23048)
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2.
Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on". (CVE-2025-49630)
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.
Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade. (CVE-2025-49812)
Late Release of Memory after Effective Lifetime vulnerability in Apache HTTP Server.
This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63.
Users are recommended to upgrade to version 2.4.64, which fixes the issue. (CVE-2025-53020)
Affected Packages:
httpd
Issue Correction:
Run dnf update httpd --releasever 2023.8.20250808 or dnf update --advisory ALAS2023-2025-1125 --releasever 2023.8.20250808 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
aarch64:
mod_session-debuginfo-2.4.64-1.amzn2023.0.1.aarch64
mod_proxy_html-debuginfo-2.4.64-1.amzn2023.0.1.aarch64
httpd-debuginfo-2.4.64-1.amzn2023.0.1.aarch64
mod_ssl-debuginfo-2.4.64-1.amzn2023.0.1.aarch64
mod_ldap-debuginfo-2.4.64-1.amzn2023.0.1.aarch64
mod_session-2.4.64-1.amzn2023.0.1.aarch64
httpd-2.4.64-1.amzn2023.0.1.aarch64
httpd-tools-debuginfo-2.4.64-1.amzn2023.0.1.aarch64
mod_ldap-2.4.64-1.amzn2023.0.1.aarch64
httpd-tools-2.4.64-1.amzn2023.0.1.aarch64
httpd-devel-2.4.64-1.amzn2023.0.1.aarch64
mod_lua-2.4.64-1.amzn2023.0.1.aarch64
mod_ssl-2.4.64-1.amzn2023.0.1.aarch64
mod_proxy_html-2.4.64-1.amzn2023.0.1.aarch64
mod_lua-debuginfo-2.4.64-1.amzn2023.0.1.aarch64
httpd-debugsource-2.4.64-1.amzn2023.0.1.aarch64
httpd-core-2.4.64-1.amzn2023.0.1.aarch64
httpd-core-debuginfo-2.4.64-1.amzn2023.0.1.aarch64
noarch:
httpd-filesystem-2.4.64-1.amzn2023.0.1.noarch
httpd-manual-2.4.64-1.amzn2023.0.1.noarch
src:
httpd-2.4.64-1.amzn2023.0.1.src
x86_64:
mod_session-debuginfo-2.4.64-1.amzn2023.0.1.x86_64
httpd-tools-debuginfo-2.4.64-1.amzn2023.0.1.x86_64
mod_proxy_html-debuginfo-2.4.64-1.amzn2023.0.1.x86_64
httpd-tools-2.4.64-1.amzn2023.0.1.x86_64
mod_session-2.4.64-1.amzn2023.0.1.x86_64
mod_ldap-debuginfo-2.4.64-1.amzn2023.0.1.x86_64
httpd-debugsource-2.4.64-1.amzn2023.0.1.x86_64
mod_proxy_html-2.4.64-1.amzn2023.0.1.x86_64
httpd-debuginfo-2.4.64-1.amzn2023.0.1.x86_64
mod_lua-debuginfo-2.4.64-1.amzn2023.0.1.x86_64
httpd-2.4.64-1.amzn2023.0.1.x86_64
httpd-devel-2.4.64-1.amzn2023.0.1.x86_64
mod_ssl-2.4.64-1.amzn2023.0.1.x86_64
mod_ssl-debuginfo-2.4.64-1.amzn2023.0.1.x86_64
mod_ldap-2.4.64-1.amzn2023.0.1.x86_64
mod_lua-2.4.64-1.amzn2023.0.1.x86_64
httpd-core-debuginfo-2.4.64-1.amzn2023.0.1.x86_64
httpd-core-2.4.64-1.amzn2023.0.1.x86_64