-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 SUMMARY cPanel, Inc. has released updated RPMs for EasyApache 4 on January 5, 2017, with Apache version 2.4.25. This release addresses vulnerabilities related to CVE-2016-0736, CVE-2016-2161, CVE-2016-5387, CVE-2016-8740, and CVE-2016-8743. We strongly encourage all Apache 2.4 users to upgrade to version 2.4.25. AFFECTED VERSIONS All versions of Apache 2.4 through version 2.4.23 SECURITY RATING The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs: CVE-2016-0736 - MEDIUM Apache 2.4.25 Fixed bug in mod_session_crypto related to CVE-2016-0736 CVE-2016-2161 - MEDIUM Apache 2.4.25 Fixed bug in mod_auth_digest related to CVE-2016-2161 CVE-2016-5387 - HIGH Apache 2.4.25 Fixed bug in Core related to CVE-2016-5387 CVE-2016-8740 - HIGH Apache 2.4.25 Fixed bug in mod_http2 related to CVE-2016-8740 CVE-2016-8743 - MEDIUM Apache 2.4.25 Fixed whitespace parsing defects related to CVE-2016-8743 SOLUTION cPanel, Inc. has released updated RPMs for EasyApache 4 on January 5, 2017, with a updated versions of Apache 2.4.25. Unless you have enabled automatic RPM updates in your cron, update your system with either yum update or WHM's Run System Update interface. REFERENCES https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8740 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5387 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2161 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0736 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-8743 http://www.apache.org/dist/httpd/CHANGES_2.4.25 -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJYblxfAAoJEJUhvtyr2U3fGuUP/3btzeHFvHwaQHT9wKRg7cHi Z6/spvCiplEevlrwBleClDTXj3J4+8HGgcpCXCcQjs1jc2olYloMCrZaMo9hWTUy 9EOU9IsTkeoGUpfGWzkqN1UF2uhPBCC8bseNVwhlyBDWHzOU3px1lspQEumPpMZG HRNW5lknLYdAXbJaZPaatYdxhVF0LjnWK0f+BBKV7ZsFSYSpIK+4RbBP6W4V0DqN DjtXeP+0OoBBwyujAm/dQA/joVLSOPQkNg/yiWtFbal+0f8tQcEbAwAPGf1R1fxJ YdsaJFayaawiymrWJgm7fQyxvq+4Kd1EeHrmrLmV3QxPfInruJ23v8QK/oL3UC/I PXzCLHtgHcNnK9q680XgfUy3yhD4hOKYO2fVsul4Tu9TRHsvY2gz+mBLGdKsXHss ROo6mZQGqiGYWqTb9zsqXgRu7XvV5x63iTFOuf81fyfot1iXtGx9eBU2VuRtX+YM mT6xtuJSDslvILsMeyKvPzMFcuIJrH9BTOO16EAeT2AlJsaMLIm6kq6dh2YaIK1a soWer9UUsopxUd4+DvMlc4b/+wKKp0paq9vY0i3/5yBDCB+wvT3ZZ3WT0nYtRdDm oNk9G3IKxdAGPu2KJGTdxcrYjx88rrx68ZGAO6Q6wpeOPJi0MyyG51gEEjFdd4Rt oMlyF4cuKPaaLZQPIwp7 =X/qM -----END PGP SIGNATURE-----