{
    "containers": {
        "cna": {
            "affected": [
                {
                    "defaultStatus": "unaffected",
                    "product": "Apache HTTP Server",
                    "vendor": "Apache Software Foundation",
                    "versions": [
                        {
                            "lessThanOrEqual": "2.4.66",
                            "status": "affected",
                            "version": "0",
                            "versionType": "semver"
                        }
                    ]
                }
            ],
            "credits": [
                {
                    "lang": "en",
                    "type": "finder",
                    "value": "Pavel Kohout, Aisle Research, Aisle.com"
                }
            ],
            "descriptions": [
                {
                    "lang": "en",
                    "supportingMedia": [
                        {
                            "base64": false,
                            "type": "text/html",
                            "value": "A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs.<br><br>The only known use-case for mod_dav_lock was mod_dav_svn from Apache Subversion earlier than version 1.2.0.<br><br>Users are recommended to upgrade to version 2.4.67, which fixes this issue, or remove mod_dav_lock.<br>"
                        }
                    ],
                    "value": "A NULL pointer dereference in mod_dav_lock in Apache HTTP Server 2.4.66 and earlier may allow an attacker to crash the server with a malicious request.mod_dav_lock is not used internally by mod_dav or mod_dav_fs.\n\nThe only known use-case for mod_dav_lock was mod_dav_svn from Apache Subversion earlier than version 1.2.0.\n\nUsers are recommended to upgrade to version 2.4.67, which fixes this issue, or remove mod_dav_lock."
                }
            ],
            "metrics": [
                {
                    "other": {
                        "content": {
                            "text": "low"
                        },
                        "type": "Textual description of severity"
                    }
                }
            ],
            "problemTypes": [
                {
                    "descriptions": [
                        {
                            "cweId": "CWE-476",
                            "description": "CWE-476 NULL Pointer Dereference",
                            "lang": "en",
                            "type": "CWE"
                        }
                    ]
                }
            ],
            "providerMetadata": {
                "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09"
            },
            "source": {
                "discovery": "EXTERNAL"
            },
            "timeline": [
                {
                    "lang": "en",
                    "time": "2026-03-04T11:46:00.000Z",
                    "value": "Report received"
                },
                {
                    "lang": "eng",
                    "time": "2026-05-04",
                    "value": "2.4.67 released"
                },
                {
                    "lang": "en",
                    "time": "2026-05-04T12:00:00.000Z",
                    "value": "fixed in 2.4.x by r1933354"
                }
            ],
            "title": "mod_dav_lock indirect lock crash",
            "x_generator": {
                "engine": "Vulnogram 0.2.0"
            },
            "references": [
                {
                    "tags": [
                        "vendor-advisory"
                    ],
                    "url": "https://httpd.apache.org/security/vulnerabilities_24.html"
                }
            ]
        }
    },
    "cveMetadata": {
        "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
        "cveId": "CVE-2026-29169",
        "serial": 1,
        "state": "PUBLISHED"
    },
    "dataType": "CVE_RECORD",
    "dataVersion": "5.1",
    "CNA_private": {
        "emailed": null,
        "projecturl": null,
        "owner": "httpd",
        "state": "RESERVED",
        "todo": [],
        "type": "unsure"
    }
}
