{"schema_version":"1.7.2","id":"OESA-2026-2316","modified":"2026-05-15T14:01:34Z","published":"2026-05-15T14:01:34Z","upstream":["CVE-2026-24072","CVE-2026-28780","CVE-2026-29168","CVE-2026-29169","CVE-2026-33006","CVE-2026-34059"],"summary":"httpd security update","details":"Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.\r\n\r\nSecurity Fix(es):\n\nAn escalation of privilege bug in various modules in Apache HTTP 2.4.66 and earlier allows local .htaccess authors to read files with the privileges of the httpd user.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes this issue.(CVE-2026-24072)\n\nHeap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server.\nIf mod_proxy_ajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to mod_proxy_ajp and cause it to write 4 attacker controlled bytes after the end of a heap based buffer.\n\nThis issue affects Apache HTTP Server: through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-28780)\n\nAllocation of Resources Without Limits or Throttling vulnerability in Apache HTTP Server&apos;s  mod_md via OCSP response data.\n\nThis issue affects Apache HTTP Server: from 2.4.30 through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-29168)\n\nA NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs.\n\nThe only known use-case for mod_dav_lock was mod_dav_svn from Apache Subversion earlier than version 1.2.0.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes this issue, or remove mod_dav_lock.(CVE-2026-29169)\n\nA timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes this issue.(CVE-2026-33006)\n\nBuffer Over-read vulnerability in Apache HTTP Server.\n\nThis issue affects Apache HTTP Server: through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-34059)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"httpd","purl":"pkg:rpm/openEuler/httpd&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.58-14.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["httpd-2.4.58-14.oe2403sp3.aarch64.rpm","httpd-debuginfo-2.4.58-14.oe2403sp3.aarch64.rpm","httpd-debugsource-2.4.58-14.oe2403sp3.aarch64.rpm","httpd-devel-2.4.58-14.oe2403sp3.aarch64.rpm","httpd-tools-2.4.58-14.oe2403sp3.aarch64.rpm","mod_ldap-2.4.58-14.oe2403sp3.aarch64.rpm","mod_md-2.4.58-14.oe2403sp3.aarch64.rpm","mod_proxy_html-2.4.58-14.oe2403sp3.aarch64.rpm","mod_session-2.4.58-14.oe2403sp3.aarch64.rpm","mod_ssl-2.4.58-14.oe2403sp3.aarch64.rpm"],"noarch":["httpd-filesystem-2.4.58-14.oe2403sp3.noarch.rpm","httpd-help-2.4.58-14.oe2403sp3.noarch.rpm"],"src":["httpd-2.4.58-14.oe2403sp3.src.rpm"],"x86_64":["httpd-2.4.58-14.oe2403sp3.x86_64.rpm","httpd-debuginfo-2.4.58-14.oe2403sp3.x86_64.rpm","httpd-debugsource-2.4.58-14.oe2403sp3.x86_64.rpm","httpd-devel-2.4.58-14.oe2403sp3.x86_64.rpm","httpd-tools-2.4.58-14.oe2403sp3.x86_64.rpm","mod_ldap-2.4.58-14.oe2403sp3.x86_64.rpm","mod_md-2.4.58-14.oe2403sp3.x86_64.rpm","mod_proxy_html-2.4.58-14.oe2403sp3.x86_64.rpm","mod_session-2.4.58-14.oe2403sp3.x86_64.rpm","mod_ssl-2.4.58-14.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2316"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-24072"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28780"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-29168"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-29169"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33006"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34059"}],"database_specific":{"severity":"Critical"}}
