{"id":13077,"date":"2019-08-22T06:07:58","date_gmt":"2019-08-22T06:07:58","guid":{"rendered":"http:\/\/news.cpanel.com\/?p=57443"},"modified":"2019-08-22T06:07:58","modified_gmt":"2019-08-22T06:07:58","slug":"easyapache-4-aug-21-release","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/easyapache-4-aug-21-release\/","title":{"rendered":"EasyApache 4 Aug 21 Release"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/news.cpanel.com\/wp-content\/uploads\/2017\/01\/og-cPnews-1.jpg\" class=\"ff-og-image-inserted\" alt=\"\" title=\"\"><\/div>\n<p>We are happy to announce that cPanel, L.L.C. has released an update for EasyApache 4! Take a look at some highlights below, and then join us on&nbsp;<a href=\"https:\/\/go.cpanel.net\/slack\" target=\"_blank\" rel=\"noopener\">Slack<\/a>,&nbsp;<a href=\"https:\/\/go.cpanel.net\/discord\" target=\"_blank\" rel=\"noopener\">Discord<\/a>, or&nbsp;<a href=\"https:\/\/reddit.com\/r\/cpanel\/\" target=\"_blank\" rel=\"noopener\">Reddit<\/a>&nbsp;to talk about this update and much more.<\/p>\n<p><strong>\u2022 ea-apache2<\/strong><br \/>&nbsp; &nbsp; &nbsp;\u2022 EA-8612: Update ea-apache2 from v2.4.39 to v2.4.41<br \/>&nbsp; &nbsp; &nbsp;\u2022 EA-8588: Added default RequestReadTimeout for mod_reqtimeout<br \/>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CVE-2019-9517<br \/>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CVE-2019-10081 &nbsp;<br \/>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;CVE-2019-10098 <br \/>&nbsp;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;CVE-2019-10092 <br \/>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp; CVE-2019-10097 <br \/>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CVE-2019-10082 <\/p>\n<p><strong>\u2022 ea-apache2-config<\/strong><br \/>&nbsp; &nbsp; &nbsp;\u2022 EA-8610: Adjust pecl patch for CloudLinux to skip if alt-php in use<\/p>\n<p><strong>\u2022 ea-nghttp2<\/strong><br \/>&nbsp; &nbsp; &nbsp;\u2022 EA-8611: Update ea-nghttp2 from v1.39.1 to v1.39.2 <br \/>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVE-2019-9511<br \/>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; CVE-2019-9513<\/p>\n<p><strong>\u2022 ea-nodejs10<\/strong><br \/>&nbsp; &nbsp; &nbsp;\u2022 EA-8608: Update ea-nodejs10 from v10.16.1 to v10.16.2<\/p>\n<p><strong>\u2022 ea-tomcat85<\/strong><br \/>&nbsp; &nbsp; &nbsp;\u2022 EA-8619: Update ea-tomcat85 from v8.5.40 to v8.5.43<br \/>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;CVE-2019-10072: &nbsp;Expand HTTP\/2 timeout handling to include connection window exhaustion on write.<\/p>\n<p><strong>SUMMARY<\/strong><br \/>cPanel, L.L.C. has updated RPMs for EasyApache 4 with Apache version 2.4.41, NGHTTP2 version 1.39.2, and Tomcat version 8.5.43. This release addresses vulnerabilities related to CVE-2019-10081, CVE-2019-9517, CVE-2019-10098, CVE-2019-10092, CVE-2019-10097, CVE-2019-10082, CVE-2019-9511, CVE-2019-9513, and CVE-2019-10072. We strongly encourage all Apache users to upgrade to version 2.4.41, all Tomcat users to upgrade to version 8.5.43, and all NGHTTP2 users to upgrade to version 1.39.2.<\/p>\n<p><strong>AFFECTED VERSIONS<\/strong><br \/>All versions of Apache through 2.4.39<br \/>All versions of NGHTTP2 through 1.39.1<br \/>All versions of Tomcat through 8.5.42<\/p>\n<p><strong>SECURITY RATING<\/strong><br \/>The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:<\/p>\n<p><strong>CVE-2019-10081 \u2013 MEDIUM<\/strong><br \/>Apache 2.4.41<br \/>Fixed bug related to CVE-2019-10081<\/p>\n<p><strong>CVE-2019-9517 \u2013 MEDIUM<\/strong><br \/>Apache 2.4.41<br \/>Fixed bug related to CVE-2019-9517<\/p>\n<p><strong>CVE-2019-10098 \u2013 MEDIUM<\/strong><br \/>Apache 2.4.41<br \/>Fixed bug related to CVE-2019-10098<\/p>\n<p><strong>CVE-2019-10092 \u2013 MEDIUM<\/strong><br \/>Apache 2.4.41<br \/>Fixed bug related to CVE-2019-10092<\/p>\n<p><strong>CVE-2019-10097 \u2013 MEDIUM<\/strong><br \/>Apache 2.4.41<br \/>Fixed bug related to CVE-2019-10097<\/p>\n<p><strong>CVE-2019-10082 \u2013 MEDIUM<\/strong><br \/>Apache 2.4.41<br \/>Fixed bug related to CVE-2019-10082<\/p>\n<p><strong>CVE-2019-9511 \u2013 MEDIUM<\/strong><br \/>NGHTTP2 1.39.2<br \/>Fixed bug related to CVE-2019-9511<\/p>\n<p><strong>CVE-2019-9513 \u2013 MEDIUM<\/strong><br \/>NGHTTP2 1.39.2<br \/>Fixed bug related to CVE-2019-9513<\/p>\n<p><strong>CVE-2019-10072 \u2013 MEDIUM<\/strong><br \/>Tomcat 8.5.42<br \/>Fixed bug releated to CVE-2019-10072<\/p>\n<p><strong>SOLUTION<\/strong><br \/>cPanel, L.L.C. has released updated RPMs for EasyApache 4 on August 21, 2019, with updated versions of Apache version 2.4.41, NGHTTP2 version 1.39.2, and Tomcat version 8.5.43. Unless you have enabled automatic RPM updates in your cron, update your system with either yum update or WHM\u2019s Run System Update interface.<\/p>\n<p><strong>REFERENCES<\/strong><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10081\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10081<\/a><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-9517\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-9517<\/a><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10098\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10098<\/a><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10092\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10092<\/a><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10097\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10097<\/a><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10082\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10082<\/a><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-9511\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-9511<\/a><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-9513\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-9513<\/a><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10072\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-10072<\/a><br \/><a href=\"http:\/\/www.apache.org\/dist\/httpd\/CHANGES_2.4\" target=\"_blank\" rel=\"noopener\">http:\/\/www.apache.org\/dist\/httpd\/CHANGES_2.4<\/a><br \/><a href=\"https:\/\/github.com\/nghttp2\/nghttp2\/releases\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/nghttp2\/nghttp2\/releases<\/a><br \/><a href=\"http:\/\/tomcat.apache.org\/tomcat-8.5-doc\/changelog.html\" target=\"_blank\" rel=\"noopener\">http:\/\/tomcat.apache.org\/tomcat-8.5-doc\/changelog.html<\/a><\/p>\n<p>For the PGP-signed message, please see&nbsp;<a href=\"http:\/\/news.cpanel.com\/wp-content\/uploads\/2019\/08\/EA4-2019-8-21-CVE.signed.txt\" target=\"_blank\" rel=\"noopener\">EA4-2019-8-21-CVE.signed<\/a><br \/><strong><br \/>More Information<\/strong><\/p>\n<p>Information about all releases this year can be found in the&nbsp;<a href=\"https:\/\/documentation.cpanel.net\/display\/EA4\/EasyApache+4+Change+Log+2019\" target=\"_blank\" rel=\"noopener\">2019 EasyApache 4 Changelog<\/a>&nbsp;and&nbsp;the&nbsp;<a href=\"https:\/\/documentation.cpanel.net\/display\/EA4\/EasyApache+4+Release+Notes\" target=\"_blank\" rel=\"noopener\">EasyApache 4 Release Notes<\/a>. To ensure that you receive up-to-date product news from cPanel, we encourage you to subscribe to the Product and Security updates&nbsp;mailing list on&nbsp;<a href=\"https:\/\/cpanel.net\/mailing-list\" target=\"_blank\" rel=\"noopener\">our website.<\/a>&nbsp;You can also sign up for our&nbsp;<a href=\"http:\/\/mail.cpanel.net\/mailman\/listinfo\/ea4development-announce_cpanel.net\" target=\"_blank\" rel=\"noopener\">EasyApache Development<\/a>&nbsp;and&nbsp;<a href=\"http:\/\/mail.cpanel.net\/mailman\/listinfo\/ea4production-announce_cpanel.net\" target=\"_blank\" rel=\"noopener\">EasyApache Production<\/a>&nbsp;lists to see when updates are pushed for our RPMs, letting you know ahead of time what will be updated in each EasyApache release.<\/p>\n<p> \u0645\u062f\u06cc\u0631\u06cc\u062a \u0633\u0631\u0648\u0631 \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0648 \u0645\u0634\u0627\u0648\u0631\u0647 &#8211; \u062b\u0628\u062a \u062f\u0627\u0645\u0646\u0647<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are happy to announce that cPanel, L.L.C. has released an update for EasyApache 4! Take a look at some highlights below, and then join us on&nbsp;Slack,&nbsp;Discord, or&nbsp;Reddit&nbsp;to talk about this update and much more. \u2022 ea-apache2&nbsp; &nbsp; &nbsp;\u2022 EA-8612: Update ea-apache2 from v2.4.39 to v2.4.41&nbsp; &nbsp; &nbsp;\u2022 EA-8588: Added default RequestReadTimeout for mod_reqtimeout&nbsp; &nbsp; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-13077","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/13077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=13077"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/13077\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=13077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=13077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=13077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}