<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2026-0018</id>
    <title>An update for httpd is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2026-03-02 12:00:43"/>
    <updated date="2026-03-02 12:00:43"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-66200" id="CVE-2025-66200" title="CVE-2025-66200 Base Score: 5.4 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-58098" id="CVE-2025-58098" title="CVE-2025-58098 Base Score: 8.3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2025-65082" id="CVE-2025-65082" title="CVE-2025-65082 Base Score: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue. (CVE-2025-66200)

Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd=&quot;...&quot; directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue. (CVE-2025-58098)

Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue. (CVE-2025-65082)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="httpd">
        <name>HCE 2.0</name>
        <package arch="x86_64" name="httpd" version="2.4.51" release="5.r32.hce2">
          <filename>httpd-2.4.51-5.r32.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="httpd-devel" version="2.4.51" release="5.r32.hce2">
          <filename>httpd-devel-2.4.51-5.r32.hce2.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="httpd-filesystem" version="2.4.51" release="5.r32.hce2">
          <filename>httpd-filesystem-2.4.51-5.r32.hce2.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="httpd-help" version="2.4.51" release="5.r32.hce2">
          <filename>httpd-help-2.4.51-5.r32.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="httpd-tools" version="2.4.51" release="5.r32.hce2">
          <filename>httpd-tools-2.4.51-5.r32.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mod_ldap" version="2.4.51" release="5.r32.hce2">
          <filename>mod_ldap-2.4.51-5.r32.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mod_md" version="2.4.51" release="5.r32.hce2">
          <filename>mod_md-2.4.51-5.r32.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mod_proxy_html" version="2.4.51" release="5.r32.hce2">
          <filename>mod_proxy_html-2.4.51-5.r32.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mod_session" version="2.4.51" release="5.r32.hce2">
          <filename>mod_session-2.4.51-5.r32.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="mod_ssl" version="2.4.51" release="5.r32.hce2">
          <filename>mod_ssl-2.4.51-5.r32.hce2.x86_64.rpm</filename>
        </package>
        <package arch="aarch64" name="httpd" version="2.4.51" release="5.r32.hce2">
          <filename>httpd-2.4.51-5.r32.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="httpd-devel" version="2.4.51" release="5.r32.hce2">
          <filename>httpd-devel-2.4.51-5.r32.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="httpd-tools" version="2.4.51" release="5.r32.hce2">
          <filename>httpd-tools-2.4.51-5.r32.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mod_ldap" version="2.4.51" release="5.r32.hce2">
          <filename>mod_ldap-2.4.51-5.r32.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mod_md" version="2.4.51" release="5.r32.hce2">
          <filename>mod_md-2.4.51-5.r32.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mod_proxy_html" version="2.4.51" release="5.r32.hce2">
          <filename>mod_proxy_html-2.4.51-5.r32.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mod_session" version="2.4.51" release="5.r32.hce2">
          <filename>mod_session-2.4.51-5.r32.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="mod_ssl" version="2.4.51" release="5.r32.hce2">
          <filename>mod_ssl-2.4.51-5.r32.hce2.aarch64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
