This issue affects Apache HTTP Server: 2.4.66.
Users are recommended to upgrade to version 2.4.67, which fixes the issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6248-1 | apache2 security update |
Ubuntu USN |
USN-8239-1 | Apache HTTP Server vulnerabilities |
Wed, 06 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1341 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 04 May 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:http_server:2.4.66:*:*:*:*:*:*:* |
Mon, 04 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 04 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache http Server |
|
| Vendors & Products |
Apache
Apache http Server |
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 04 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Double Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. | |
| Title | Apache HTTP Server: http2: double free and possible RCE on early reset | |
| Weaknesses | CWE-415 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-05T03:56:10.684Z
Reserved: 2026-01-19T13:00:21.720Z
Link: CVE-2026-23918
Updated: 2026-05-04T17:32:35.852Z
Status : Analyzed
Published: 2026-05-04T15:16:03.583
Modified: 2026-05-04T20:24:58.200
Link: CVE-2026-23918
OpenCVE Enrichment
Updated: 2026-05-06T02:00:12Z
Debian DSA
Ubuntu USN