Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Fedora » httpd 2.4.23 updates

httpd 2.4.23 updates

Security fix for CVE-2016-5387

  • Vendor: Fedora
  • Vendor ID: FEDORA-2016-9fd9bfab9e
  • Date: July 22, 2016


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2016-9fd9bfab9e
2016-07-22 15:08:36.270686
--------------------------------------------------------------------------------

Name : httpd
Product : Fedora 24
Version : 2.4.23
Release : 4.fc24
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2016-5387
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1353755 - CVE-2016-5387 Apache HTTPD: sets environmental variable based on user
supplied Proxy request header
https://bugzilla.redhat.com/show_bug.cgi?id=1353755
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program. Use
su -c 'yum update httpd' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
[email protected]
https://lists.fedoraproject.org/admin/lists/package-annou...

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »