<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2026:20030-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-01-14T10:49:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-01-14T10:49:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-01-14T10:49:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache2 fixes the following issues:

  - CVE-2025-55753: Fixed mod_md (ACME), unintended retry intervals (bsc#1254511)
  - CVE-2025-58098: Fixed Server Side Includes adds query string to #exec cmd (bsc#1254512)
  - CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514)
  - CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Leap-16.0-139</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254511</URL>
      <Description>SUSE Bug 1254511</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254512</URL>
      <Description>SUSE Bug 1254512</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254514</URL>
      <Description>SUSE Bug 1254514</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1254515</URL>
      <Description>SUSE Bug 1254515</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-55753/</URL>
      <Description>SUSE CVE CVE-2025-55753 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-58098/</URL>
      <Description>SUSE CVE CVE-2025-58098 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-65082/</URL>
      <Description>SUSE CVE CVE-2025-65082 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-66200/</URL>
      <Description>SUSE CVE CVE-2025-66200 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 16.0">
      <Branch Type="Product Name" Name="openSUSE Leap 16.0">
        <FullProductName ProductID="openSUSE Leap 16.0">openSUSE Leap 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.63-160000.3.1">
      <FullProductName ProductID="apache2-2.4.63-160000.3.1">apache2-2.4.63-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-devel-2.4.63-160000.3.1">
      <FullProductName ProductID="apache2-devel-2.4.63-160000.3.1">apache2-devel-2.4.63-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-event-2.4.63-160000.3.1">
      <FullProductName ProductID="apache2-event-2.4.63-160000.3.1">apache2-event-2.4.63-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-manual-2.4.63-160000.3.1">
      <FullProductName ProductID="apache2-manual-2.4.63-160000.3.1">apache2-manual-2.4.63-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.63-160000.3.1">
      <FullProductName ProductID="apache2-prefork-2.4.63-160000.3.1">apache2-prefork-2.4.63-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.63-160000.3.1">
      <FullProductName ProductID="apache2-utils-2.4.63-160000.3.1">apache2-utils-2.4.63-160000.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.63-160000.3.1">
      <FullProductName ProductID="apache2-worker-2.4.63-160000.3.1">apache2-worker-2.4.63-160000.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.63-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:apache2-2.4.63-160000.3.1">apache2-2.4.63-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.63-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:apache2-devel-2.4.63-160000.3.1">apache2-devel-2.4.63-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-event-2.4.63-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:apache2-event-2.4.63-160000.3.1">apache2-event-2.4.63-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-manual-2.4.63-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:apache2-manual-2.4.63-160000.3.1">apache2-manual-2.4.63-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.63-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:apache2-prefork-2.4.63-160000.3.1">apache2-prefork-2.4.63-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.63-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:apache2-utils-2.4.63-160000.3.1">apache2-utils-2.4.63-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.63-160000.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 16.0">
      <FullProductName ProductID="openSUSE Leap 16.0:apache2-worker-2.4.63-160000.3.1">apache2-worker-2.4.63-160000.3.1 as a component of openSUSE Leap 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.

This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.


Users are recommended to upgrade to version 2.4.66, which fixes the issue.</Note>
    </Notes>
    <CVE>CVE-2025-55753</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:apache2-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-devel-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-event-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-manual-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-prefork-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-utils-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-worker-2.4.63-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-55753.html</URL>
        <Description>CVE-2025-55753</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254511</URL>
        <Description>SUSE Bug 1254511</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.</Note>
    </Notes>
    <CVE>CVE-2025-58098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:apache2-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-devel-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-event-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-manual-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-prefork-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-utils-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-worker-2.4.63-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-58098.html</URL>
        <Description>CVE-2025-58098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254512</URL>
        <Description>SUSE Bug 1254512</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.</Note>
    </Notes>
    <CVE>CVE-2025-65082</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:apache2-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-devel-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-event-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-manual-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-prefork-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-utils-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-worker-2.4.63-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-65082.html</URL>
        <Description>CVE-2025-65082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254514</URL>
        <Description>SUSE Bug 1254514</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.</Note>
    </Notes>
    <CVE>CVE-2025-66200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 16.0:apache2-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-devel-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-event-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-manual-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-prefork-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-utils-2.4.63-160000.3.1</ProductID>
        <ProductID>openSUSE Leap 16.0:apache2-worker-2.4.63-160000.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-66200.html</URL>
        <Description>CVE-2025-66200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1254515</URL>
        <Description>SUSE Bug 1254515</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
