<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for httpd is now available for openEuler-24.03-LTS-SP1</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2026-1528</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2026-03-06</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2026-03-06</InitialReleaseDate>
		<CurrentReleaseDate>2026-03-06</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2026-03-06</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">httpd security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for httpd is now available for openEuler-24.03-LTS-SP1</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.

Security Fix(es):

An integer overflow vulnerability was found in Apache HTTP Server versions 2.4.30 to 2.4.66. In case of failed ACME certificate renewal, after a number of failures (~30 days in default configurations), the backoff timer becomes 0. Certificate renewal attempts are then repeated without delays until successful. This issue affects confidentiality, integrity, and availability.(CVE-2025-55753)

Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=&quot;...&quot; directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.(CVE-2025-58098)

Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.(CVE-2025-65082)

mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.(CVE-2025-66200)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for httpd is now available for openEuler-24.03-LTS-SP1.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">httpd</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1528</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-55753</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-58098</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-65082</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-66200</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-55753</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-58098</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-65082</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-66200</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="httpd-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="httpd-debuginfo-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-debuginfo-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="httpd-debugsource-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-debugsource-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="httpd-devel-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-devel-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="httpd-tools-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-tools-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_ldap-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_ldap-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_md-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_md-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_proxy_html-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_proxy_html-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_session-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_session-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_ssl-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_ssl-2.4.58-12.oe2403sp1.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="httpd-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-2.4.58-12.oe2403sp1.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="httpd-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="httpd-debuginfo-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-debuginfo-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="httpd-debugsource-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-debugsource-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="httpd-devel-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-devel-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="httpd-tools-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-tools-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_ldap-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_ldap-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_md-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_md-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_proxy_html-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_proxy_html-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_session-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_session-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_ssl-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_ssl-2.4.58-12.oe2403sp1.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="httpd-filesystem-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-filesystem-2.4.58-12.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="httpd-help-2.4.58-12" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">httpd-help-2.4.58-12.oe2403sp1.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow vulnerability was found in Apache HTTP Server versions 2.4.30 to 2.4.66. In case of failed ACME certificate renewal, after a number of failures (~30 days in default configurations), the backoff timer becomes 0. Certificate renewal attempts are then repeated without delays until successful. This issue affects confidentiality, integrity, and availability.</Note>
		</Notes>
		<ReleaseDate>2026-03-06</ReleaseDate>
		<CVE>CVE-2025-55753</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>httpd security update</Description>
				<DATE>2026-03-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1528</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=&quot;...&quot; directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.</Note>
		</Notes>
		<ReleaseDate>2026-03-06</ReleaseDate>
		<CVE>CVE-2025-58098</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.3</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>httpd security update</Description>
				<DATE>2026-03-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1528</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.</Note>
		</Notes>
		<ReleaseDate>2026-03-06</ReleaseDate>
		<CVE>CVE-2025-65082</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>httpd security update</Description>
				<DATE>2026-03-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1528</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.</Note>
		</Notes>
		<ReleaseDate>2026-03-06</ReleaseDate>
		<CVE>CVE-2025-66200</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>5.4</BaseScore>
				<Vector>AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>httpd security update</Description>
				<DATE>2026-03-06</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1528</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>