{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Critical"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"httpd security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for httpd is now available for openEuler-22.03-LTS-SP4",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.\n\nSecurity Fix(es):\n\nAn escalation of privilege bug in various modules in Apache HTTP 2.4.66 and earlier allows local .htaccess authors to read files with the privileges of the httpd user.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes this issue.(CVE-2026-24072)\n\nHeap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server.\nIf mod_proxy_ajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to mod_proxy_ajp and cause it to write 4 attacker controlled bytes after the end of a heap based buffer.\n\nThis issue affects Apache HTTP Server: through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-28780)\n\nAllocation of Resources Without Limits or Throttling vulnerability in Apache HTTP Server's  mod_md via OCSP response data.\n\nThis issue affects Apache HTTP Server: from 2.4.30 through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-29168)\n\nA NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs.\n\nThe only known use-case for mod_dav_lock was mod_dav_svn from Apache Subversion earlier than version 1.2.0.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes this issue, or remove mod_dav_lock.(CVE-2026-29169)\n\nA timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes this issue.(CVE-2026-33006)\n\nBuffer Over-read vulnerability in Apache HTTP Server.\n\nThis issue affects Apache HTTP Server: through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.(CVE-2026-34059)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for httpd is now available for openEuler-22.03-LTS-SP4.\n\nopenEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Critical",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"httpd",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2026-2318",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2318"
			},
			{
				"summary":"CVE-2026-24072",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-24072&packageName=httpd"
			},
			{
				"summary":"CVE-2026-28780",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-28780&packageName=httpd"
			},
			{
				"summary":"CVE-2026-29168",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-29168&packageName=httpd"
			},
			{
				"summary":"CVE-2026-29169",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-29169&packageName=httpd"
			},
			{
				"summary":"CVE-2026-33006",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-33006&packageName=httpd"
			},
			{
				"summary":"CVE-2026-34059",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-34059&packageName=httpd"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-24072"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28780"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-29168"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-29169"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33006"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34059"
			},
			{
				"summary":"openEuler-SA-2026-2318 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2026/csaf-openeuler-sa-2026-2318.json"
			}
		],
		"title":"An update for httpd is now available for openEuler-22.03-LTS-SP4",
		"tracking":{
			"initial_release_date":"2026-05-15T22:04:14+08:00",
			"revision_history":[
				{
					"date":"2026-05-15T22:04:14+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2026-05-15T22:04:14+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2026-05-15T22:04:14+08:00",
			"id":"openEuler-SA-2026-2318",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"openEuler-22.03-LTS-SP4",
									"name":"openEuler-22.03-LTS-SP4"
								},
								"name":"openEuler-22.03-LTS-SP4",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"httpd-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"httpd-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-debuginfo-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"httpd-debuginfo-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"httpd-debuginfo-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-debugsource-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"httpd-debugsource-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"httpd-debugsource-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-devel-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"httpd-devel-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"httpd-devel-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-tools-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"httpd-tools-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"httpd-tools-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_ldap-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"mod_ldap-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"mod_ldap-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_md-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"mod_md-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"mod_md-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_proxy_html-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"mod_proxy_html-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"mod_proxy_html-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_session-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"mod_session-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"mod_session-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_ssl-2.4.51-29.oe2203sp4.aarch64.rpm",
									"name":"mod_ssl-2.4.51-29.oe2203sp4.aarch64.rpm"
								},
								"name":"mod_ssl-2.4.51-29.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-2.4.51-29.oe2203sp4.src.rpm",
									"name":"httpd-2.4.51-29.oe2203sp4.src.rpm"
								},
								"name":"httpd-2.4.51-29.oe2203sp4.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"httpd-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"httpd-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-debuginfo-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"httpd-debuginfo-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"httpd-debuginfo-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-debugsource-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"httpd-debugsource-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"httpd-debugsource-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-devel-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"httpd-devel-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"httpd-devel-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-tools-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"httpd-tools-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"httpd-tools-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_ldap-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"mod_ldap-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"mod_ldap-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_md-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"mod_md-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"mod_md-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_proxy_html-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"mod_proxy_html-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"mod_proxy_html-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_session-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"mod_session-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"mod_session-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"mod_ssl-2.4.51-29.oe2203sp4.x86_64.rpm",
									"name":"mod_ssl-2.4.51-29.oe2203sp4.x86_64.rpm"
								},
								"name":"mod_ssl-2.4.51-29.oe2203sp4.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-filesystem-2.4.51-29.oe2203sp4.noarch.rpm",
									"name":"httpd-filesystem-2.4.51-29.oe2203sp4.noarch.rpm"
								},
								"name":"httpd-filesystem-2.4.51-29.oe2203sp4.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"httpd-help-2.4.51-29.oe2203sp4.noarch.rpm",
									"name":"httpd-help-2.4.51-29.oe2203sp4.noarch.rpm"
								},
								"name":"httpd-help-2.4.51-29.oe2203sp4.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-2.4.51-29.oe2203sp4.aarch64",
					"name":"httpd-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-debuginfo-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-debuginfo-2.4.51-29.oe2203sp4.aarch64",
					"name":"httpd-debuginfo-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-debugsource-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-debugsource-2.4.51-29.oe2203sp4.aarch64",
					"name":"httpd-debugsource-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-devel-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-devel-2.4.51-29.oe2203sp4.aarch64",
					"name":"httpd-devel-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-tools-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-tools-2.4.51-29.oe2203sp4.aarch64",
					"name":"httpd-tools-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_ldap-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_ldap-2.4.51-29.oe2203sp4.aarch64",
					"name":"mod_ldap-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_md-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_md-2.4.51-29.oe2203sp4.aarch64",
					"name":"mod_md-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_proxy_html-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_proxy_html-2.4.51-29.oe2203sp4.aarch64",
					"name":"mod_proxy_html-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_session-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_session-2.4.51-29.oe2203sp4.aarch64",
					"name":"mod_session-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_ssl-2.4.51-29.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_ssl-2.4.51-29.oe2203sp4.aarch64",
					"name":"mod_ssl-2.4.51-29.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-2.4.51-29.oe2203sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-2.4.51-29.oe2203sp4.src",
					"name":"httpd-2.4.51-29.oe2203sp4.src as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-2.4.51-29.oe2203sp4.x86_64",
					"name":"httpd-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-debuginfo-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-debuginfo-2.4.51-29.oe2203sp4.x86_64",
					"name":"httpd-debuginfo-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-debugsource-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-debugsource-2.4.51-29.oe2203sp4.x86_64",
					"name":"httpd-debugsource-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-devel-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-devel-2.4.51-29.oe2203sp4.x86_64",
					"name":"httpd-devel-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-tools-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-tools-2.4.51-29.oe2203sp4.x86_64",
					"name":"httpd-tools-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_ldap-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_ldap-2.4.51-29.oe2203sp4.x86_64",
					"name":"mod_ldap-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_md-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_md-2.4.51-29.oe2203sp4.x86_64",
					"name":"mod_md-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_proxy_html-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_proxy_html-2.4.51-29.oe2203sp4.x86_64",
					"name":"mod_proxy_html-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_session-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_session-2.4.51-29.oe2203sp4.x86_64",
					"name":"mod_session-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"mod_ssl-2.4.51-29.oe2203sp4.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:mod_ssl-2.4.51-29.oe2203sp4.x86_64",
					"name":"mod_ssl-2.4.51-29.oe2203sp4.x86_64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-filesystem-2.4.51-29.oe2203sp4.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-filesystem-2.4.51-29.oe2203sp4.noarch",
					"name":"httpd-filesystem-2.4.51-29.oe2203sp4.noarch as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"httpd-help-2.4.51-29.oe2203sp4.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:httpd-help-2.4.51-29.oe2203sp4.noarch",
					"name":"httpd-help-2.4.51-29.oe2203sp4.noarch as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2026-24072",
			"notes":[
				{
					"text":"An escalation of privilege bug in various modules in Apache HTTP 2.4.66 and earlier allows local .htaccess authors to read files with the privileges of the httpd user.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes this issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:httpd-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:httpd-debuginfo-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:httpd-debugsource-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:httpd-devel-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:httpd-tools-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:mod_ldap-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:mod_md-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:mod_proxy_html-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:mod_session-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:mod_ssl-2.4.51-29.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP4:httpd-2.4.51-29.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:httpd-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:httpd-debuginfo-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:httpd-debugsource-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:httpd-devel-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:httpd-tools-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:mod_ldap-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:mod_md-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:mod_proxy_html-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:mod_session-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:mod_ssl-2.4.51-29.oe2203sp4.x86_64",
					"openEuler-22.03-LTS-SP4:httpd-filesystem-2.4.51-29.oe2203sp4.noarch",
					"openEuler-22.03-LTS-SP4:httpd-help-2.4.51-29.oe2203sp4.noarch"
				]
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"httpd security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2318"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-24072"
		},
		{
			"cve":"CVE-2026-28780",
			"notes":[
				{
					"text":"Heap-based Buffer Overflow vulnerability in mod_proxy_ajp of Apache HTTP Server.\nIf mod_proxy_ajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to mod_proxy_ajp and cause it to write 4 attacker controlled bytes after the end of a heap based buffer.\n\nThis issue affects Apache HTTP Server: through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"httpd security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2318"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"CRITICAL",
						"baseScore":9.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"Critical",
					"category":"impact"
				}
			],
			"title":"CVE-2026-28780"
		},
		{
			"cve":"CVE-2026-29168",
			"notes":[
				{
					"text":"Allocation of Resources Without Limits or Throttling vulnerability in Apache HTTP Server's  mod_md via OCSP response data.\n\nThis issue affects Apache HTTP Server: from 2.4.30 through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"httpd security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2318"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.3,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-29168"
		},
		{
			"cve":"CVE-2026-29169",
			"notes":[
				{
					"text":"A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs.\n\nThe only known use-case for mod_dav_lock was mod_dav_svn from Apache Subversion earlier than version 1.2.0.\n\nUsers are recommended to upgrade to version 2.4.66, which fixes this issue, or remove mod_dav_lock.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"httpd security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2318"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-29169"
		},
		{
			"cve":"CVE-2026-33006",
			"notes":[
				{
					"text":"A timing attack against mod_auth_digest in Apache HTTP Server 2.4.66 allows a bypass of Digest authentication by a remote attacker.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes this issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"httpd security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2318"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.8,
						"vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-33006"
		},
		{
			"cve":"CVE-2026-34059",
			"notes":[
				{
					"text":"Buffer Over-read vulnerability in Apache HTTP Server.\n\nThis issue affects Apache HTTP Server: through 2.4.66.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes the issue.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
			},
			"remediations":[
				{
					"product_ids":{"$ref":"$.vulnerabilities[0].product_status.fixed"},
					"details":"httpd security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2318"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":{"$ref":"$.vulnerabilities[0].product_status.fixed"}
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2026-34059"
		}
	]
}