On Friday, 23 December 2016 18:56:54 CET Niko Tyni wrote:
> This passage in RFC 7230, section 9.4., seems relevant:
>
>A more effective mitigation is to prevent anything other than the
>server's core protocol libraries from sending a CR or LF within the
>header section, which means
Hello dear maintainer(s),
the Debian LTS team would like to fix the security issues which are
currently open in the Wheezy version of apache2:
https://security-tracker.debian.org/tracker/CVE-2016-8743
Would you like to take care of this yourself?
If yes, please follow the workflow we have
Control: retitle -1 libapache2-mod-perl2: FTBFS: test failures with Apache
2.4.25
Control: tag -1 patch
@apache2 maintainers (cc'd): it seems that mod_perl is no longer able
to 'inject headers' with apache2 2.4.25. See below. A workaround is to
explicitly configure the server for 'unsafe'
Blind? That's Exodus in reverse, and it's the most iconic phrase God
has ever spoken. Listen. Let there be light.
HTTP://BYGOD.PCRIOT.COM/bygod3.html
This is a message about freedom--delivering true universal voting,
indicating a number of technologies that have been hidden, and yet
recorded
4 matches
Mail list logo