Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2026:0020-1

Опубликовано: 05 янв. 2026
Источник: suse-cvrf

Описание

Security update for apache2

This update for apache2 fixes the following issues:

  • CVE-2025-55753: Fixed mod_md (ACME) unintended retry intervals (bsc#1254511)
  • CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514)
  • CVE-2025-58098: Fixed Server Side Includes adding query string to #exec cmd=... (bsc#1254512)
  • CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515)

Список пакетов

SUSE Linux Enterprise Server 15 SP6-LTSS
apache2-2.4.58-150600.5.41.1
apache2-devel-2.4.58-150600.5.41.1
apache2-prefork-2.4.58-150600.5.41.1
apache2-utils-2.4.58-150600.5.41.1
apache2-worker-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server for SAP Applications 15 SP6
apache2-2.4.58-150600.5.41.1
apache2-devel-2.4.58-150600.5.41.1
apache2-prefork-2.4.58-150600.5.41.1
apache2-utils-2.4.58-150600.5.41.1
apache2-worker-2.4.58-150600.5.41.1
openSUSE Leap 15.6
apache2-2.4.58-150600.5.41.1
apache2-devel-2.4.58-150600.5.41.1
apache2-event-2.4.58-150600.5.41.1
apache2-manual-2.4.58-150600.5.41.1
apache2-prefork-2.4.58-150600.5.41.1
apache2-utils-2.4.58-150600.5.41.1
apache2-worker-2.4.58-150600.5.41.1

Описание

An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.


Затронутые продукты
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1

Ссылки

Описание

Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.


Затронутые продукты
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1

Ссылки

Описание

Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs. This issue affects Apache HTTP Server from 2.4.0 through 2.4.65. Users are recommended to upgrade to version 2.4.66 which fixes the issue.


Затронутые продукты
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1

Ссылки

Описание

mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65. Users are recommended to upgrade to version 2.4.66, which fixes the issue.


Затронутые продукты
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-devel-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-prefork-2.4.58-150600.5.41.1
SUSE Linux Enterprise Server 15 SP6-LTSS:apache2-utils-2.4.58-150600.5.41.1

Ссылки