-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 SUMMARY cPanel, Inc. has released EasyApache 3.34.2 with Apache version 2.4.23 and patches to Apache 2.4 and 2.2 for the HTTPROXY vulnerability. This release addresses vulnerabilities related to CVE-2016-1546, CVE-2016-4979, and CVE-2016-5387. We strongly encourage all EasyApache users to update to version 3.34.2 and all Apache 2.4 users to upgrade to version 2.4.23. AFFECTED VERSIONS All versions of EasyApache through version 3.34.1 All versions of Apache 2.4 through version 2.4.20 All versions of Apache 2.2 through version 2.2.31 SECURITY RATING The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs: CVE-2016-1546 - Medium Apache 2.4.20 Fixed bug in mod_http2 related to CVE-2016-1546 CVE-2016-4979 - High Apache 2.4.20 Fixed bug in mod_ssl related to CVE-2016-4979. CVE-2016-5387 - HIGH Apache 2.4 Patched Apache 2.4 for HTTPOXY vulnerability. Apache 2.2 Patched Apache 2.2 for HTTPOXY vulnerability. SOLUTION cPanel, Inc. has released EasyApache 3.34.2 with patches for Apache 2.4 and 2.2, and an updated version of Apache 2.4.23. Unless you have disabled EasyApache updates, the EasyApache application updates to the latest version when launched. Run EasyApache to rebuild your profile with the latest version of Apache. REFERENCES https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-1546 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-4979 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5387 http://www.apache.org/dist/httpd/CHANGES_2.4 https://www.apache.org/security/asf-httpoxy-response.txt https://documentation.cpanel.net/display/CKB/CVE-2016-5387+HTTPOXY -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJXj5V7AAoJEJUhvtyr2U3ffYcQAMU71wT4O803+M2sRW4gP/Ro CaCUgrOSog1VidqSqTHNOiZbg2cE16X0BP/JeqgDqx+bkkNu8mhiB1umHPn2E3vG FxM73SISlmtb8BmdJyk3CDsxdF5ukzxbKrqft1JldIHYpKL3vBj2euaeMOp96eKJ /tB0d5vlaBa9wdtgDQ5JoBxVkvCncj0a8bREEQ3NojCn+OfdkrtdEJX2QFHS+tOV uv63e3E9LjVqjsobBRbTR6VUxHx3F+ZouytEVn1qO9xxKNViVNSd1PP18nbih/km nHFA8eF/Nvr5qHxFhWmg50or9d1W+/v80INypj04YNEUQmUkRalPuvhVMBuhnck0 NhVhxNgm1hMGTVUv7gHGs6V0Z44W3Od64OCgw2nSt/EDHyJfcvoDSWtuEAbzxWaJ PnlEhttKdFd8bb0jKBSJK0t1vUI6tHR+4+MqVXppVz+eOHCZ2hbseXPsjCCwT8hw VMq5h/k/Cp/4eKBC+e0YAHO/aOGssDpZ/jBYfnqXVAWyt8vFSxInGMlScw4Q46v2 GpV2v0H9+vGeVzTPYESfxlPrM/sM5Xqj9G1luegZh18Hv9d6FLfX6YZyw33E/QgF bENMkKMiNVJBiaAuHSMOHB3CB1hpO/GjXBxvhJzMrF+o0ULD1Yv+TetgjhW9pwMw S0qspjHwmfhbopT8GagS =6yTi -----END PGP SIGNATURE-----