{"schema_version":"1.7.2","id":"OESA-2026-2317","modified":"2026-05-15T14:01:36Z","published":"2026-05-15T14:01:36Z","upstream":["CVE-2026-28780"],"summary":"httpd security update","details":"Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.\r\n\r\nSecurity Fix(es):\n\nHeap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server.\nIf mod_proxy_ajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to mod_proxy_ajp and cause it to write 4 attacker controlled bytes after the end of a heap based buffer.\n\nThis issue affects Apache HTTP Server: through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-28780)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"httpd","purl":"pkg:rpm/openEuler/httpd&distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.43-33.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["httpd-2.4.43-33.oe2003sp4.aarch64.rpm","httpd-debuginfo-2.4.43-33.oe2003sp4.aarch64.rpm","httpd-debugsource-2.4.43-33.oe2003sp4.aarch64.rpm","httpd-devel-2.4.43-33.oe2003sp4.aarch64.rpm","httpd-tools-2.4.43-33.oe2003sp4.aarch64.rpm","mod_ldap-2.4.43-33.oe2003sp4.aarch64.rpm","mod_md-2.4.43-33.oe2003sp4.aarch64.rpm","mod_proxy_html-2.4.43-33.oe2003sp4.aarch64.rpm","mod_session-2.4.43-33.oe2003sp4.aarch64.rpm","mod_ssl-2.4.43-33.oe2003sp4.aarch64.rpm"],"noarch":["httpd-filesystem-2.4.43-33.oe2003sp4.noarch.rpm","httpd-help-2.4.43-33.oe2003sp4.noarch.rpm"],"src":["httpd-2.4.43-33.oe2003sp4.src.rpm"],"x86_64":["httpd-2.4.43-33.oe2003sp4.x86_64.rpm","httpd-debuginfo-2.4.43-33.oe2003sp4.x86_64.rpm","httpd-debugsource-2.4.43-33.oe2003sp4.x86_64.rpm","httpd-devel-2.4.43-33.oe2003sp4.x86_64.rpm","httpd-tools-2.4.43-33.oe2003sp4.x86_64.rpm","mod_ldap-2.4.43-33.oe2003sp4.x86_64.rpm","mod_md-2.4.43-33.oe2003sp4.x86_64.rpm","mod_proxy_html-2.4.43-33.oe2003sp4.x86_64.rpm","mod_session-2.4.43-33.oe2003sp4.x86_64.rpm","mod_ssl-2.4.43-33.oe2003sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2317"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28780"}],"database_specific":{"severity":"Critical"}}
