Skip to content

Commit f5ccaa3

Browse files
committed
publishing release httpd-2.4.64
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1927106 13f79535-47bb-0310-9956-ffa450edef68
1 parent d20cd14 commit f5ccaa3

28 files changed

+1420
-1150
lines changed

CHANGES

Lines changed: 98 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,104 @@
11
-*- coding: utf-8 -*-
2+
Changes with Apache 2.4.65
3+
24
Changes with Apache 2.4.64
35

6+
*) SECURITY: CVE-2025-53020: Apache HTTP Server: HTTP/2 DoS by
7+
Memory Increase (cve.mitre.org)
8+
Late Release of Memory after Effective Lifetime vulnerability in
9+
Apache HTTP Server.
10+
This issue affects Apache HTTP Server: from 2.4.17 up to 2.4.63.
11+
Users are recommended to upgrade to version 2.4.64, which fixes
12+
the issue.
13+
Credits: Gal Bar Nahum
14+
15+
*) SECURITY: CVE-2025-49812: Apache HTTP Server: mod_ssl TLS
16+
upgrade attack (cve.mitre.org)
17+
In some mod_ssl configurations on Apache HTTP Server versions
18+
through to 2.4.63, an HTTP desynchronisation attack allows a
19+
man-in-the-middle attacker to hijack an HTTP session via a TLS
20+
upgrade.
21+
Only configurations using "SSLEngine optional" to enable TLS
22+
upgrades are affected. Users are recommended to upgrade to
23+
version 2.4.64, which removes support for TLS upgrade.
24+
Credits: Robert Merget (Technology Innovation Institute)
25+
26+
*) SECURITY: CVE-2025-49630: Apache HTTP Server: mod_proxy_http2
27+
denial of service (cve.mitre.org)
28+
In certain proxy configurations, a denial of service attack
29+
against Apache HTTP Server versions 2.4.26 through to 2.4.63
30+
can be triggered by untrusted clients causing an assertion in
31+
mod_proxy_http2.
32+
Configurations affected are a reverse proxy is configured for an
33+
HTTP/2 backend, with ProxyPreserveHost set to "on".
34+
Credits: Anthony CORSIEZ
35+
36+
*) SECURITY: CVE-2025-23048: Apache HTTP Server: mod_ssl access
37+
control bypass with session resumption (cve.mitre.org)
38+
In some mod_ssl configurations on Apache HTTP Server 2.4.35
39+
through to 2.4.62, an access control bypass by trusted clients
40+
is possible using TLS 1.3 session resumption.
41+
Configurations are affected when mod_ssl is configured for
42+
multiple virtual hosts, with each restricted to a different set
43+
of trusted client certificates (for example with a different
44+
SSLCACertificateFile/Path setting). In such a case, a client
45+
trusted to access one virtual host may be able to access another
46+
virtual host, if SSLStrictSNIVHostCheck is not enabled in either
47+
virtual host.
48+
Credits: Sven Hebrok, Felix Cramer, Tim Storm, Maximilian Radoy,
49+
and Juraj Somorovsky at Paderborn University
50+
51+
*) SECURITY: CVE-2024-47252: Apache HTTP Server: mod_ssl error log
52+
variable escaping (cve.mitre.org)
53+
Insufficient escaping of user-supplied data in mod_ssl in Apache
54+
HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS
55+
client to insert escape characters into log files in some
56+
configurations.
57+
In a logging configuration where CustomLog is used with
58+
"%{varname}x" or "%{varname}c" to log variables provided by
59+
mod_ssl such as SSL_TLS_SNI, no escaping is performed by either
60+
mod_log_config or mod_ssl and unsanitized data provided by the
61+
client may appear in log files.
62+
Credits: John Runyon
63+
64+
*) SECURITY: CVE-2024-43394: Apache HTTP Server: SSRF on Windows
65+
due to UNC paths (cve.mitre.org)
66+
Server-Side Request Forgery (SSRF) in Apache HTTP Server on
67+
Windows allows to potentially leak NTLM hashes to a malicious
68+
server via
69+
mod_rewrite or apache expressions that pass unvalidated request
70+
input.
71+
This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.
72+
Note: The Apache HTTP Server Project will be setting a higher
73+
bar for accepting vulnerability reports regarding SSRF via UNC
74+
paths.
75+
The server offers limited protection against administrators
76+
directing the server to open UNC paths.
77+
Windows servers should limit the hosts they will connect over
78+
via SMB based on the nature of NTLM authentication.
79+
Credits: Kainan Zhang (@4xpl0r3r) from Fortinet
80+
81+
*) SECURITY: CVE-2024-43204: Apache HTTP Server: SSRF with
82+
mod_headers setting Content-Type header (cve.mitre.org)
83+
SSRF in Apache HTTP Server with mod_proxy loaded allows an
84+
attacker to send outbound proxy requests to a URL controlled by
85+
the attacker. Requires an unlikely configuration where
86+
mod_headers is configured to modify the Content-Type request or
87+
response header with a value provided in the HTTP request.
88+
Users are recommended to upgrade to version 2.4.64 which fixes
89+
this issue.
90+
91+
*) SECURITY: CVE-2024-42516: Apache HTTP Server: HTTP response
92+
splitting (cve.mitre.org)
93+
HTTP response splitting in the core of Apache HTTP Server allows
94+
an attacker who can manipulate the Content-Type response headers
95+
of applications hosted or proxied by the server can split the
96+
HTTP response.
97+
This vulnerability was described as CVE-2023-38709 but the patch
98+
included in Apache HTTP Server 2.4.59 did not address the issue.
99+
Users are recommended to upgrade to version 2.4.64, which fixes
100+
this issue.
101+
4102
*) mod_proxy_ajp: Use iobuffersize set on worker level for the IO buffer
5103
size. PR 69402 [Jari Ahonen <[email protected]>]
6104

STATUS

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,8 @@ Release history:
2929
[NOTE that x.{odd}.z versions are strictly Alpha/Beta releases,
3030
while x.{even}.z versions are Stable/GA releases.]
3131

32-
2.4.64 : In development
32+
2.4.65 : In development
33+
2.4.64 : Released on July 10, 2025
3334
2.4.63 : Released on January 23, 2025
3435
2.4.62 : Released on July 17, 2024
3536
2.4.61 : Released on July 03, 2024

docs/manual/mod/core.html.en

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5022,8 +5022,12 @@ certain events before failing a request</td></tr>
50225022

50235023

50245024
<div class="warning"><h3>Security</h3>
5025-
<p>UNC paths accessed outside of request processing, such as during startup,
5026-
are not necessarily checked against the hosts configured with this directive.</p>
5025+
<p>The values specified by this directive are only checked by some
5026+
components of the server, prior to accessing filesystem paths that
5027+
may be inadvertently derived from untrusted inputs. </p>
5028+
<p> Windows systems should be isolated at the network layer from
5029+
making outbound SMB/NTLM calls to unexpected destinations as a
5030+
more comprehensive and pre-emptive measure.</p>
50275031
</div>
50285032

50295033
<div class="warning"><h3>Directive Ordering</h3>

docs/manual/mod/core.html.fr.utf8

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,8 @@
3333
<a href="../ja/mod/core.html" hreflang="ja" rel="alternate" title="Japanese">&nbsp;ja&nbsp;</a> |
3434
<a href="../tr/mod/core.html" hreflang="tr" rel="alternate" title="Türkçe">&nbsp;tr&nbsp;</a></p>
3535
</div>
36+
<div class="outofdate">Cette traduction peut être périmée. Vérifiez la version
37+
anglaise pour les changements récents.</div>
3638
<table class="module"><tr><th><a href="module-dict.html#Description">Description:</a></th><td>Fonctionnalités de base du serveur HTTP Apache toujours
3739
disponibles</td></tr>
3840
<tr><th><a href="module-dict.html#Status">Statut:</a></th><td>Noyau httpd</td></tr></table>

docs/manual/mod/core.xml.de

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<?xml version="1.0"?>
22
<!DOCTYPE modulesynopsis SYSTEM "../style/modulesynopsis.dtd">
33
<?xml-stylesheet type="text/xsl" href="../style/manual.de.xsl"?>
4-
<!-- English Revision: 344972:1923004 (outdated) -->
4+
<!-- English Revision: 344972:1927041 (outdated) -->
55

66
<!--
77
Licensed to the Apache Software Foundation (ASF) under one or more

docs/manual/mod/core.xml.es

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<?xml version="1.0"?>
22
<!DOCTYPE modulesynopsis SYSTEM "../style/modulesynopsis.dtd">
33
<?xml-stylesheet type="text/xsl" href="../style/manual.es.xsl"?>
4-
<!-- English Revision: 1741251:1923004 (outdated) -->
4+
<!-- English Revision: 1741251:1927041 (outdated) -->
55
<!-- Translated by Luis Gil de Bernabé Pfeiffer lgilbernabe[AT]apache.org -->
66
<!-- Reviewed by Sergio Ramos-->
77
<!--

docs/manual/mod/core.xml.fr

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<?xml version="1.0" encoding="UTF-8" ?>
22
<!DOCTYPE modulesynopsis SYSTEM "../style/modulesynopsis.dtd">
33
<?xml-stylesheet type="text/xsl" href="../style/manual.fr.xsl"?>
4-
<!-- English Revision: 1923004 -->
4+
<!-- English Revision: 1923004:1927041 (outdated) -->
55
<!-- French translation : Lucien GENTIS -->
66
<!-- Reviewed by : Vincent Deffontaines -->
77

docs/manual/mod/core.xml.ja

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<?xml version="1.0" encoding="UTF-8" ?>
22
<!DOCTYPE modulesynopsis SYSTEM "../style/modulesynopsis.dtd">
33
<?xml-stylesheet type="text/xsl" href="../style/manual.ja.xsl"?>
4-
<!-- English Revision: 669847:1923004 (outdated) -->
4+
<!-- English Revision: 669847:1927041 (outdated) -->
55

66
<!--
77
Licensed to the Apache Software Foundation (ASF) under one or more

docs/manual/mod/core.xml.meta

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
<variant outdated="yes">de</variant>
1111
<variant>en</variant>
1212
<variant outdated="yes">es</variant>
13-
<variant>fr</variant>
13+
<variant outdated="yes">fr</variant>
1414
<variant outdated="yes">ja</variant>
1515
<variant outdated="yes">tr</variant>
1616
</variants>

docs/manual/mod/core.xml.tr

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
<?xml version="1.0" encoding="UTF-8"?>
22
<!DOCTYPE modulesynopsis SYSTEM "../style/modulesynopsis.dtd">
33
<?xml-stylesheet type="text/xsl" href="../style/manual.tr.xsl"?>
4-
<!-- English Revision: 1907151:1923004 (outdated) -->
4+
<!-- English Revision: 1907151:1927041 (outdated) -->
55
<!-- =====================================================
66
Translated by: Nilgün Belma Bugüner <nilgun belgeler.gen.tr>
77
Reviewed by: Orhan Berent <berent belgeler.gen.tr>

0 commit comments

Comments
 (0)