-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4452-1                [email protected]
https://www.debian.org/lts/security/                   Bastien Roucariès
January 24, 2026                              https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : apache2
Version        : 2.4.66-1~deb11u1
CVE ID         : CVE-2025-55753 CVE-2025-58098 CVE-2025-59775 CVE-2025-65082 
                 CVE-2025-66200
Debian Bug     : 1121926

Multiple vulnerabilities were fixed for apache httpd a popular webserver.

CVE-2025-55753

    An integer overflow was found in the case of failed ACME certificate
    renewal leads, after a number of failures (~30 days in default 
configurations),
    to the backoff timer becoming 0. Attempts to renew the certificate
    then are repeated without delays until it succeeds

CVE-2025-58098

    Apache with Server Side Includes (SSI) enabled and mod_cgid (but not 
mod_cgi)
    passes the shell-escaped query string to #exec cmd="..." directives.

CVE-2025-59775

    A Server-Side Request Forgery (SSRF) vulnerability was found
    in Apache HTTP Server on Windows with AllowEncodedSlashes On
    and MergeSlashes Off  allows to potentially leak NTLM hashes to
    a malicious server via SSRF

CVE-2025-65082

    An Improper Neutralization of Escape, Meta, or Control Sequences
    vulnerability was found in Apache HTTP Server through environment
    variables set via the Apache configuration unexpectedly superseding
    variables calculated by the server for CGI programs.

CVE-2025-66200

    An mod_userdir+suexec bypass, via AllowOverride FileInfo
    vulnerability was found in Apache HTTP Server.
    Users with access to use the RequestHeader directive
    in htaccess can cause some CGI scripts to run under an unexpected userid.

For Debian 11 bullseye, these problems have been fixed in version
2.4.66-1~deb11u1.

We recommend that you upgrade your apache2 packages.

For the detailed security status of apache2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/apache2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=xooq
-----END PGP SIGNATURE-----

Reply via email to