<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Web-Hosting on kalfaoglu.net</title><link>https://blog.kalfaoglu.net/tags/web-hosting/</link><description>Recent content in Web-Hosting on kalfaoglu.net</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 06 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://blog.kalfaoglu.net/tags/web-hosting/index.xml" rel="self" type="application/rss+xml"/><item><title>Apache HTTP/2 Double-Free (CVE-2026-23918): What You Need to Do Before Friday</title><link>https://blog.kalfaoglu.net/posts/2026-05-06-apache-http2-cve-2026-23918-en/</link><pubDate>Wed, 06 May 2026 00:00:00 +0000</pubDate><guid>https://blog.kalfaoglu.net/posts/2026-05-06-apache-http2-cve-2026-23918-en/</guid><description>&lt;p&gt;A memory-corruption bug in Apache HTTP Server&amp;rsquo;s HTTP/2 implementation was publicly disclosed this week, and the details are ugly enough that you should stop reading this sentence and go check your Apache version right now. Done? Good. Let&amp;rsquo;s talk about what&amp;rsquo;s actually going on.&lt;/p&gt;
&lt;h2 id="the-bug"&gt;The Bug&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://app.opencve.io/cve/CVE-2026-23918"&gt;CVE-2026-23918&lt;/a&gt; is a double-free vulnerability in &lt;code&gt;mod_http2&lt;/code&gt;, specifically in the stream cleanup path of Apache httpd 2.4.66. A double-free happens when code tries to release the same chunk of memory twice &amp;mdash; a classic mistake that corrupts internal allocator state and typically leads to crashes, and sometimes worse.&lt;/p&gt;</description></item></channel></rss>