Apache HTTP Server, Bind, Linux Kernel updates for Ubuntu

Published by

Ubuntu Linux has announced a series of critical security updates addressing vulnerabilities in several key components, including the Apache HTTP Server, Bind DNS server, and the Linux kernel across different Ubuntu versions. These updates are crucial for maintaining system security and performance.

1. Apache HTTP Server Vulnerabilities
The update, detailed in Ubuntu Security Notice USN-7639-1, includes fixes for multiple vulnerabilities in the Apache HTTP Server affecting versions 25.04, 24.04 LTS, and 22.04 LTS. Notable issues include:
- HTTP Response Splitting (CVE-2024-42516)
- Outbound Proxy Requests (CVE-2024-43204)
- Log Injection via mod_ssl (CVE-2024-47252)
- TLS 1.3 Session Bypass (CVE-2025-23048)
- Denial of Service via mod_proxy_http2 (CVE-2025-49630)
- HTTP Session Hijacking (CVE-2025-49812)
- Resource Consumption (CVE-2025-53020)

2. Bind Vulnerability
USN-7641-1 addresses a vulnerability in Bind DNS affecting Ubuntu 25.04. This flaw could lead to a denial of service if Bind processes specially crafted network traffic, particularly when the `stale-answer-client-timeout` option is misconfigured (CVE-2025-40777).

3. Linux Kernel Vulnerabilities
Multiple updates were issued for the Linux kernel, identified in notices USN-7640-1 and USN-7585-7. Key highlights include:
- IoT Kernel Vulnerabilities (USN-7640-1): Affects Ubuntu 20.04 LTS, addressing issues that could compromise sensitive information through mismanaged CIFS file systems (CVE-2025-2312) and vulnerabilities across various subsystems.
- Raspberry Pi Kernel Vulnerabilities (USN-7585-7): Security fixes for Ubuntu 20.04 and 18.04 LTS, including similar CIFS issues and multiple vulnerabilities across various architectures and subsystems.

4. Low Latency Kernel Vulnerabilities
USN-7610-3 discusses vulnerabilities in the low-latency kernel for Ubuntu 24.04 LTS, which could potentially lead to system compromise through flaws in network traffic control and Netfilter (CVE-2025-38001, CVE-2025-37997).

Update Instructions
To ensure your system is secure:
- For Apache, Bind, and kernel updates, users are advised to perform standard updates via their package managers.
- Post-update, a system reboot is required, especially for kernel updates due to ABI changes that necessitate recompilation of third-party modules.

Conclusion
These updates underscore the importance of regular maintenance and vigilance in system security practices. Users are encouraged to consult the provided references for further details and to follow the update instructions to mitigate any potential risks associated with these vulnerabilities. For more information, visit [Ubuntu's security notices](https://ubuntu.com/security/notices)

Apache HTTP Server, Bind, Linux Kernel updates for Ubuntu

Ubuntu Linux has been updated with security updates, including fixes for vulnerabilities in Apache HTTP Server, Bind, and Linux Kernel:

[USN-7639-1] Apache HTTP Server vulnerabilities
[USN-7641-1] Bind vulnerability
[USN-7640-1] Linux kernel (IoT) vulnerabilities
[USN-7585-7] Linux kernel (Raspberry Pi) vulnerabilities
[USN-7610-3] Linux kernel (Low Latency) vulnerabilities

Apache HTTP Server, Bind, Linux Kernel updates for Ubuntu @ Linux Compatible