{"schema_version":"1.7.2","id":"OESA-2026-2402","modified":"2026-05-22T13:18:46Z","published":"2026-05-22T13:18:46Z","upstream":["CVE-2026-33007","CVE-2026-33523","CVE-2026-33857","CVE-2026-34032"],"summary":"httpd security update","details":"Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.\r\n\r\nSecurity Fix(es):\n\nA NULL pointer dereference in the mod_authn_socache in Apache HTTP Server 2.4.66 and earlier allows an unauthenticated remote user to crash a child process in a caching forward proxy configuration.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes this issue.(CVE-2026-33007)\n\nHTTP response splitting vulnerability in multiple Apache HTTP Server modules with untrusted or compromised backend servers.\n\nThis issue affects Apache HTTP Server: from through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-33523)\n\nOut-of-bounds Read vulnerability in mod_proxy_ajp of \n\nApache HTTP Server.\n\nThis issue affects Apache HTTP Server: through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-33857)\n\nImproper Null Termination, Out-of-bounds Read vulnerability in Apache HTTP Server.\n\nThis issue affects Apache HTTP Server: through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-34032)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"httpd","purl":"pkg:rpm/openEuler/httpd&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.51-30.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["httpd-2.4.51-30.oe2203sp4.aarch64.rpm","httpd-debuginfo-2.4.51-30.oe2203sp4.aarch64.rpm","httpd-debugsource-2.4.51-30.oe2203sp4.aarch64.rpm","httpd-devel-2.4.51-30.oe2203sp4.aarch64.rpm","httpd-tools-2.4.51-30.oe2203sp4.aarch64.rpm","mod_ldap-2.4.51-30.oe2203sp4.aarch64.rpm","mod_md-2.4.51-30.oe2203sp4.aarch64.rpm","mod_proxy_html-2.4.51-30.oe2203sp4.aarch64.rpm","mod_session-2.4.51-30.oe2203sp4.aarch64.rpm","mod_ssl-2.4.51-30.oe2203sp4.aarch64.rpm"],"noarch":["httpd-filesystem-2.4.51-30.oe2203sp4.noarch.rpm","httpd-help-2.4.51-30.oe2203sp4.noarch.rpm"],"src":["httpd-2.4.51-30.oe2203sp4.src.rpm"],"x86_64":["httpd-2.4.51-30.oe2203sp4.x86_64.rpm","httpd-debuginfo-2.4.51-30.oe2203sp4.x86_64.rpm","httpd-debugsource-2.4.51-30.oe2203sp4.x86_64.rpm","httpd-devel-2.4.51-30.oe2203sp4.x86_64.rpm","httpd-tools-2.4.51-30.oe2203sp4.x86_64.rpm","mod_ldap-2.4.51-30.oe2203sp4.x86_64.rpm","mod_md-2.4.51-30.oe2203sp4.x86_64.rpm","mod_proxy_html-2.4.51-30.oe2203sp4.x86_64.rpm","mod_session-2.4.51-30.oe2203sp4.x86_64.rpm","mod_ssl-2.4.51-30.oe2203sp4.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2402"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33007"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33523"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33857"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34032"}],"database_specific":{"severity":"Medium"}}
