CVE-2025-55753

NameCVE-2025-55753
DescriptionAn integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1121926

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)bullseye2.4.62-1~deb11u1vulnerable
bullseye (security)2.4.65-1~deb11u1vulnerable
bookworm2.4.65-1~deb12u1vulnerable
bookworm (security)2.4.62-1~deb12u2vulnerable
trixie2.4.65-2vulnerable
forky2.4.65-3vulnerable
sid2.4.66-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2source(unstable)2.4.66-11121926

Notes

[trixie] - apache2 <no-dsa> (Minor issue)
[bookworm] - apache2 <no-dsa> (Minor issue)
[bullseye] - apache2 <postponed> (Minor issue)
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2025-55753
https://github.com/apache/httpd/commit/ab9dd8e2cfe7d62efe5ff8925fbef1de756a2fc2

Search for package or bug name: Reporting problems