This issue affects Apache HTTP Server: from 2.4.30 through 2.4.66.
Users are recommended to upgrade to version 2.4.67, which fixes the issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4571-1 | [ERRATUM] [DLA 4571-1] apache2 security update |
Debian DSA |
DSA-6248-1 | apache2 security update |
Ubuntu USN |
USN-8239-1 | Apache HTTP Server vulnerabilities |
Wed, 13 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 05 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 05 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 05 May 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Allocation of Resources Without Limits or Throttling vulnerability in Apache HTTP Server's mod_md via OCSP response data. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue. | |
| Title | Apache HTTP Server: mod_md unrestricted OCSP response | |
| First Time appeared |
Apache
Apache http Server |
|
| Weaknesses | CWE-770 | |
| CPEs | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache http Server |
|
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-05-05T16:31:49.391Z
Reserved: 2026-03-04T11:48:34.053Z
Link: CVE-2026-29168
Updated: 2026-05-05T16:31:49.391Z
Status : Analyzed
Published: 2026-05-05T14:16:08.507
Modified: 2026-05-06T18:39:20.980
Link: CVE-2026-29168
OpenCVE Enrichment
Updated: 2026-05-05T17:45:06Z
Debian DLA
Debian DSA
Ubuntu USN