Debian Package Tracker
Register | Log in
Subscribe

apache2

Apache HTTP Server

Choose email to subscribe with

general
  • source: apache2 (main)
  • version: 2.4.66-2
  • maintainer: Debian Apache Maintainers (archive) (DMD)
  • uploaders: Stefan Fritsch [DMD] – Ondřej Surý [DMD] – Arno Töll [DMD] – Bastien Roucariès [DMD] – Yadd [DMD]
  • arch: all any
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.4.62-1~deb11u1
  • o-o-sec: 2.4.65-1~deb11u1
  • o-o-p-u: 2.4.62-1~deb11u1
  • oldstable: 2.4.65-1~deb12u1
  • old-sec: 2.4.62-1~deb12u2
  • stable: 2.4.65-2
  • testing: 2.4.65-3
  • unstable: 2.4.66-2
versioned links
  • 2.4.62-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.62-1~deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.65-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.65-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.65-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.65-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.4.66-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • apache2 (113 bugs: 1, 75, 37, 0)
  • apache2-bin (36 bugs: 0, 29, 7, 0)
  • apache2-data
  • apache2-dev (5 bugs: 0, 2, 3, 0)
  • apache2-doc (4 bugs: 0, 3, 1, 0)
  • apache2-ssl-dev
  • apache2-suexec-custom (3 bugs: 0, 2, 1, 0)
  • apache2-suexec-pristine (2 bugs: 0, 0, 2, 0)
  • apache2-utils (8 bugs: 0, 4, 4, 0)
action needed
4 security issues in forky high

There are 4 open security issues in forky.

4 important issues:
  • CVE-2025-55753: An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
  • CVE-2025-58098: Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
  • CVE-2025-65082: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs. This issue affects Apache HTTP Server from 2.4.0 through 2.4.65. Users are recommended to upgrade to version 2.4.66 which fixes the issue.
  • CVE-2025-66200: mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
Created: 2025-12-04 Last update: 2025-12-06 19:17
4 security issues in bullseye high

There are 4 open security issues in bullseye.

4 important issues:
  • CVE-2025-55753: An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
  • CVE-2025-58098: Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
  • CVE-2025-65082: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs. This issue affects Apache HTTP Server from 2.4.0 through 2.4.65. Users are recommended to upgrade to version 2.4.66 which fixes the issue.
  • CVE-2025-66200: mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
Created: 2025-12-04 Last update: 2025-12-06 19:17
1 bug tagged help in the BTS normal
The BTS contains 1 bug tagged help, please consider helping the maintainer in dealing with it.
Created: 2022-12-02 Last update: 2025-12-07 06:00
9 bugs tagged patch in the BTS normal
The BTS contains patches fixing 9 bugs (11 if counting merged bugs), consider including or untagging them.
Created: 2025-01-06 Last update: 2025-12-07 06:00
lintian reports 16 warnings normal
Lintian reports 16 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-08-12 Last update: 2025-12-05 15:01
2 open merge requests in Salsa normal
There are 2 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2025-08-19 06:28
4 low-priority security issues in trixie low

There are 4 open security issues in trixie.

4 issues left for the package maintainer to handle:
  • CVE-2025-55753: (needs triaging) An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
  • CVE-2025-58098: (needs triaging) Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
  • CVE-2025-65082: (needs triaging) Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs. This issue affects Apache HTTP Server from 2.4.0 through 2.4.65. Users are recommended to upgrade to version 2.4.66 which fixes the issue.
  • CVE-2025-66200: (needs triaging) mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65. Users are recommended to upgrade to version 2.4.66, which fixes the issue.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-12-04 Last update: 2025-12-06 19:17
4 low-priority security issues in bookworm low

There are 4 open security issues in bookworm.

4 issues left for the package maintainer to handle:
  • CVE-2025-55753: (needs triaging) An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
  • CVE-2025-58098: (needs triaging) Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
  • CVE-2025-65082: (needs triaging) Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs. This issue affects Apache HTTP Server from 2.4.0 through 2.4.65. Users are recommended to upgrade to version 2.4.66 which fixes the issue.
  • CVE-2025-66200: (needs triaging) mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65. Users are recommended to upgrade to version 2.4.66, which fixes the issue.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-12-04 Last update: 2025-12-06 19:17
debian/patches: 2 patches to forward upstream low

Among the 9 debian patches available in version 2.4.66-2 of the package, we noticed the following issues:

  • 2 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-12-06 12:01
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.6.2).
Created: 2024-04-07 Last update: 2025-12-06 02:00
testing migrations
  • excuses:
    • Migration status for apache2 (2.4.65-3 to 2.4.66-2): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for apache2/2.4.66-2: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Pass, ppc64el: Regression ♻ (reference ♻), s390x: Pass
    • ∙ ∙ Autopkgtest for mediawiki/1:1.43.5+dfsg-1: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Regression ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ Autopkgtest for mediawiki-extension-codemirror/6.0.0~git20250325.399da27-2: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Regression ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ Autopkgtest for mediawiki-extension-youtube/1.9.4~git20241126.01673ce-1: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Regression ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ Autopkgtest for mediawiki-skin-greystuff/1.2.5~git20250311.35884cb-1: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Regression ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ Autopkgtest for passenger/6.0.26+ds-1.1: amd64: Regression ♻ (reference ♻), arm64: Regression ♻ (reference ♻), i386: Regression ♻ (reference ♻), ppc64el: Regression ♻ (reference ♻), s390x: Regression ♻ (reference ♻)
    • ∙ ∙ Missing build on riscv64
    • ∙ ∙ Autopkgtest deferred on riscv64: missing arch:riscv64 build
    • ∙ ∙ Lintian check waiting for test results on riscv64 - info
    • ∙ ∙ Too young, only 1 of 5 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/a/apache2.html
    • ∙ ∙ Reproducible on amd64 - info ♻
    • ∙ ∙ Reproducible on arm64 - info ♻
    • Not considered
news
[rss feed]
  • [2025-12-05] Accepted apache2 2.4.66-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2025-12-05] Accepted apache2 2.4.66-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2025-08-28] Accepted apache2 2.4.65-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2025-08-19] apache2 2.4.65-3 MIGRATED to testing (Debian testing watch)
  • [2025-08-12] Accepted apache2 2.4.65-1~deb11u1 (source) into oldoldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-08-11] Accepted apache2 2.4.65-3 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-08-01] apache2 2.4.65-2 MIGRATED to testing (Debian testing watch)
  • [2025-07-29] Accepted apache2 2.4.65-2 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-07-23] Accepted apache2 2.4.65-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2025-07-18] apache2 2.4.64-1 MIGRATED to testing (Debian testing watch)
  • [2025-07-11] Accepted apache2 2.4.64-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2025-01-28] apache2 2.4.63-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-24] Accepted apache2 2.4.63-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-12-01] Accepted apache2 2.4.62-6 (source) into experimental (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-11-24] Accepted apache2 2.4.62-5 (source) into experimental (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-10-17] Accepted apache2 2.4.62-1~deb11u2 (source) into oldstable-security (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-10-10] Accepted apache2 2.4.62-1~deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2024-10-08] Accepted apache2 2.4.62-1~deb12u2 (source) into stable-security (Debian FTP Masters) (signed by: Bastien ROUCARIÈS)
  • [2024-10-07] apache2 2.4.62-3 MIGRATED to testing (Debian testing watch)
  • [2024-10-05] Accepted apache2 2.4.62-4 (source) into experimental (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-10-04] Accepted apache2 2.4.62-3 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-10-03] Accepted apache2 2.4.62-2 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-08-16] Accepted apache2 2.4.62-1~deb11u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2024-08-16] Accepted apache2 2.4.62-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2024-07-20] apache2 2.4.62-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-18] Accepted apache2 2.4.62-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-07-12] Accepted apache2 2.4.61-1~deb11u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2024-07-12] Accepted apache2 2.4.61-1~deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2024-07-11] Accepted apache2 2.4.61-1~deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2024-07-11] Accepted apache2 2.4.61-1~deb11u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Xavier Guimard)
  • 1
  • 2
bugs [bug history graph]
  • all: 180 185
  • RC: 1
  • I&N: 127 129
  • M&W: 52 55
  • F&P: 0
  • patch: 9 11
  • help: 1
links
  • homepage
  • lintian (0, 16)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.4.65-3ubuntu1
  • 63 bugs (4 patches)
  • patches for 2.4.65-3ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing