<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Apache on ap7i.com</title>
    <link>https://ap7i.com/tags/apache/</link>
    <description>Recent content in Apache on ap7i.com</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 10 May 2026 12:36:47 -0400</lastBuildDate>
    <atom:link href="https://ap7i.com/tags/apache/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Apache HTTP/2 Just Got an RCE Patch. Default Configs Are the Target.</title>
      <link>https://ap7i.com/posts/apache-http2-rce-cve-2026-23918/</link>
      <pubDate>Sun, 10 May 2026 12:36:47 -0400</pubDate>
      <guid>https://ap7i.com/posts/apache-http2-rce-cve-2026-23918/</guid>
      <description>CVE-2026-23918 is a double-free in Apache 2.4.66&amp;rsquo;s mod_http2. Two frames crash the worker. On Debian and the official Docker image, the same bug becomes a viable RCE path. The fix shipped May 4.</description>
    </item>
  </channel>
</rss>
