[ALSA-2025:15123] Moderate: httpd:2.4 security update
Type:
security
Severity:
moderate
Release date:
2025-09-04
Description:
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. Security Fix(es): * httpd: insufficient escaping of user-supplied data in mod_ssl (CVE-2024-47252) * httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption (CVE-2025-23048) * httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630) * httpd: HTTP Session Hijack via a TLS upgrade (CVE-2025-49812) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 mod_session-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.aarch64.rpm 1d7f979eb4024b266e47cad833b386c05b827c006d045a409a8fae426435d549
aarch64 mod_md-2.0.8-8.module_el8.6.0+2872+fe0ff7aa.aarch64.rpm 2678c086cc5a3b9b6f20f73891c8d84235646307efa87d482c5f95d828da9f4e
aarch64 httpd-tools-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.aarch64.rpm 5123c8284d4b58c9113dca9be942e1be287f33f4a767ef19f542032df4e93f5c
aarch64 httpd-devel-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.aarch64.rpm 6adea3774fa6b033531dd00f17ae793a8a732a17a5300a185f4da03db0508da0
aarch64 httpd-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.aarch64.rpm 6d11e1e7e36205443fbd5084b3118eb026c6f2f5d38eb3a506533e79819c6dae
aarch64 mod_ssl-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.aarch64.rpm 6ed756de28ae134bc5eb775001cbae992c696c85e5919d2279e0240b16769bdb
aarch64 mod_http2-1.15.7-10.module_el8.10.0+4044+ea5f78b1.4.aarch64.rpm 865044e5e6c9dba8e101d2f1395e47488bf3bdf7f7de4804f0cdb29dab9758fb
aarch64 mod_proxy_html-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.aarch64.rpm a9ea752bdf06fcd97848268fe576ef7db90e26ba64014e0c946437f086c5a9cd
aarch64 mod_ldap-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.aarch64.rpm ea7d2c12dcffdb6445843965ecadbf9033e406f985eb315849763a2e88b40e63
noarch httpd-filesystem-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.noarch.rpm a59aefc7cff071990b873dd2ab393bc9443855b4f9c37c3a60a59f5435df3543
noarch httpd-manual-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.noarch.rpm e46a48b2afaa010b7e04845a3a55d0059f2f0d1f1c2d09ba5d9e33416b74ed0c
ppc64le mod_md-2.0.8-8.module_el8.6.0+2872+fe0ff7aa.ppc64le.rpm 1a26f7d2af339e6769c26359dbdc9aa33083ab2b7d43c69c006dfafb57b05ac6
ppc64le httpd-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.ppc64le.rpm 371638956e0d27e4aed17920727964296cc6e176582b1f7c19dc41dfa792ec9b
ppc64le mod_proxy_html-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.ppc64le.rpm 3afdaacfb161d1dcd0c8c5fb4befcdbb994d256ee69721511ddcc515b5988fb0
ppc64le mod_session-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.ppc64le.rpm 59b3df1203cad77a1c57836df52ffd118c76df0f9062990b80b94fffd07497fe
ppc64le mod_ldap-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.ppc64le.rpm 753be875279b654845a7b4c215a9597b0a58bd1b5861fe9ab8d8a50df1af7fe6
ppc64le httpd-tools-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.ppc64le.rpm 7eeb1acddcc86f4e64acdfda28e26ab56481f336a38be598397fb230eeb97823
ppc64le mod_http2-1.15.7-10.module_el8.10.0+4044+ea5f78b1.4.ppc64le.rpm 82cdbc3411df01035b444787373839b456d0a6c7e4afbd230e8fdb93d19003f4
ppc64le mod_ssl-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.ppc64le.rpm c24f8f7898d8eb40b01213df8e79ace6bcaccbe94f3a6028274f694b0c1a89b0
ppc64le httpd-devel-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.ppc64le.rpm c3db7f390b0c0096e38134029c708e7b1cea92f47a2cf2b32a57893b04a346ef
s390x httpd-tools-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.s390x.rpm 0c77d1ea24df2c2f6c846cf5005c22da4199076a9215ba44d47f8a8918022733
s390x mod_ldap-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.s390x.rpm 292bca31b23fae2c5c33a09de564b8ebe6cfe0e5beacbd52dfd8a9dbec3a2739
s390x mod_proxy_html-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.s390x.rpm 300eadd435fd848ea5945880c9065187a9026f199265dabfcef20147159b26da
s390x mod_session-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.s390x.rpm 33c41acf02cfb766091a63e45402975384003edb11bd52b50ba92eecccbf9e17
s390x httpd-devel-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.s390x.rpm 37856ed33f6e4d88750e3ecf1dc619545244e273b803eea90232b90f573a31be
s390x mod_ssl-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.s390x.rpm 5e45fc2505b8e21d025f482819fffdcf962b1ebeb808d793b7425d2ea3776e89
s390x httpd-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.s390x.rpm a2da3065a4271a240bc118d85a8fe76bb9b36a0d4071acd5899708cb1c4e2a5b
s390x mod_http2-1.15.7-10.module_el8.10.0+4044+ea5f78b1.4.s390x.rpm c256308658c159f70e495ea8a5dfa7994ef785ec39c4cd04bc1240252e901c16
s390x mod_md-2.0.8-8.module_el8.6.0+3031+fb177b09.s390x.rpm e47754aea99df8718074dd3d1df288b448b0af9d0ba4f0f8c6a3b5c8a164a1a7
x86_64 httpd-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.x86_64.rpm 06ce69836522159a69f5acb5660d3800c808e832221e5b6d2f61b25dfaa29397
x86_64 mod_proxy_html-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.x86_64.rpm 07df64738db511f580b9c54ab91ac0248641c4528d856249d50e52c9e1bb9506
x86_64 mod_ssl-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.x86_64.rpm 14ab3286d92367b44d6e03019b08872b60b07b3b0dd84f9238d752753a883ccc
x86_64 mod_md-2.0.8-8.module_el8.6.0+2872+fe0ff7aa.x86_64.rpm 3b1e101e6a9192ff94ee4d007aff494cf5631948586568da7a1c6ac1255c8a68
x86_64 httpd-tools-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.x86_64.rpm 4971305278d726bc1026a38620bb25c23cc67b779d27840c408855d6afe908af
x86_64 httpd-devel-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.x86_64.rpm 5aabee6d944d73d45daabd7eeedaa55a22eefe745c6ec69f100b7fa81b8d250b
x86_64 mod_ldap-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.x86_64.rpm 8e4a25a1040839945160a3eceb635b70d3dfec8b0d236515ffcb40003823c04e
x86_64 mod_http2-1.15.7-10.module_el8.10.0+4044+ea5f78b1.4.x86_64.rpm 8f88e32a99b0d4cca92d6ed736e2a2cfe93f09712cf469a321d0f56fb7b4c541
x86_64 mod_session-2.4.37-65.module_el8.10.0+4044+ea5f78b1.5.x86_64.rpm 99b503f1a0134a7202741eea5b44707ea603b155243634c5e0fe443a45a0d5f4
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.