USN-7968-2

Source
https://ubuntu.com/security/notices/USN-7968-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7968-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7968-2
Published
2026-03-09T11:42:29Z
Modified
2026-03-10T05:49:49.908825Z
Summary
apache2 regression
Details

USN-7968-1 fixed vulnerabilities in Apache HTTP Server. The update introduced a regression in mod_md where the MDStapleOthers setting was ignored which resulted in OCSP being broken for some domains. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that the Apache HTTP Server incorrectly handled failed ACME certificate renewals. This could result in renewal attempts to be repeated without delays, possibly leading to a denial of service. (CVE-2025-55753)

Anthony Parfenov discovered that the Apache HTTP Server would pass the query string to cmd directives when configured with Server Side Includes (SSI) enabled and mod_cgid. An attacker could possibly use this issue to execute arbitrary code. (CVE-2025-58098)

Mattias Åsander discovered that the Apache HTTP Server incorrectly neutralized certain environment variables. This could result in unexpectedly superseding variables calculated by the server for CGI programs. (CVE-2025-65082)

Mattias Åsander discovered that the Apache HTTP Server incorrectly handled AllowOverride FileInfo configurations when using mod_userdir with suexec. An attacker with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid. (CVE-2025-66200)

References

Affected packages

Ubuntu:22.04:LTS / apache2

Package

Name
apache2
Purl
pkg:deb/ubuntu/apache2@2.4.52-1ubuntu4.19?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.52-1ubuntu4.19

Affected versions

2.*
2.4.48-3.1ubuntu3
2.4.48-3.1ubuntu4
2.4.51-2ubuntu1
2.4.52-1ubuntu1
2.4.52-1ubuntu2
2.4.52-1ubuntu4
2.4.52-1ubuntu4.1
2.4.52-1ubuntu4.2
2.4.52-1ubuntu4.3
2.4.52-1ubuntu4.4
2.4.52-1ubuntu4.5
2.4.52-1ubuntu4.6
2.4.52-1ubuntu4.7
2.4.52-1ubuntu4.8
2.4.52-1ubuntu4.9
2.4.52-1ubuntu4.10
2.4.52-1ubuntu4.11
2.4.52-1ubuntu4.12
2.4.52-1ubuntu4.13
2.4.52-1ubuntu4.14
2.4.52-1ubuntu4.15
2.4.52-1ubuntu4.16
2.4.52-1ubuntu4.18

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "apache2"
        },
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "apache2-bin"
        },
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "apache2-data"
        },
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "apache2-dev"
        },
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "apache2-ssl-dev"
        },
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "apache2-suexec-custom"
        },
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "apache2-suexec-pristine"
        },
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "apache2-utils"
        },
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "libapache2-mod-md"
        },
        {
            "binary_version": "2.4.52-1ubuntu4.19",
            "binary_name": "libapache2-mod-proxy-uwsgi"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7968-2.json"

Ubuntu:24.04:LTS / apache2

Package

Name
apache2
Purl
pkg:deb/ubuntu/apache2@2.4.58-1ubuntu8.11?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.58-1ubuntu8.11

Affected versions

2.*
2.4.57-2ubuntu2
2.4.57-2ubuntu3
2.4.58-1ubuntu1
2.4.58-1ubuntu2
2.4.58-1ubuntu6
2.4.58-1ubuntu7
2.4.58-1ubuntu8
2.4.58-1ubuntu8.1
2.4.58-1ubuntu8.2
2.4.58-1ubuntu8.3
2.4.58-1ubuntu8.4
2.4.58-1ubuntu8.5
2.4.58-1ubuntu8.6
2.4.58-1ubuntu8.7
2.4.58-1ubuntu8.8
2.4.58-1ubuntu8.10

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "apache2"
        },
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "apache2-bin"
        },
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "apache2-data"
        },
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "apache2-dev"
        },
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "apache2-ssl-dev"
        },
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "apache2-suexec-custom"
        },
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "apache2-suexec-pristine"
        },
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "apache2-utils"
        },
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "libapache2-mod-md"
        },
        {
            "binary_version": "2.4.58-1ubuntu8.11",
            "binary_name": "libapache2-mod-proxy-uwsgi"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7968-2.json"

Ubuntu:25.10 / apache2

Package

Name
apache2
Purl
pkg:deb/ubuntu/apache2@2.4.64-1ubuntu3.3?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.64-1ubuntu3.3

Affected versions

2.*
2.4.63-1ubuntu1
2.4.63-1ubuntu3
2.4.64-1ubuntu2
2.4.64-1ubuntu3
2.4.64-1ubuntu3.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2.4.64-1ubuntu3.3",
            "binary_name": "apache2"
        },
        {
            "binary_version": "2.4.64-1ubuntu3.3",
            "binary_name": "apache2-bin"
        },
        {
            "binary_version": "2.4.64-1ubuntu3.3",
            "binary_name": "apache2-data"
        },
        {
            "binary_version": "2.4.64-1ubuntu3.3",
            "binary_name": "apache2-dev"
        },
        {
            "binary_version": "2.4.64-1ubuntu3.3",
            "binary_name": "apache2-ssl-dev"
        },
        {
            "binary_version": "2.4.64-1ubuntu3.3",
            "binary_name": "apache2-suexec-custom"
        },
        {
            "binary_version": "2.4.64-1ubuntu3.3",
            "binary_name": "apache2-suexec-pristine"
        },
        {
            "binary_version": "2.4.64-1ubuntu3.3",
            "binary_name": "apache2-utils"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:25.10"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7968-2.json"