{"id":17350,"date":"2021-09-23T00:10:31","date_gmt":"2021-09-22T21:10:31","guid":{"rendered":"https:\/\/news.cpanel.com\/?p=59737"},"modified":"2021-09-25T09:12:17","modified_gmt":"2021-09-25T05:42:17","slug":"easyapache-4-september-22-release","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/easyapache-4-september-22-release\/","title":{"rendered":"EasyApache 4 September 22 Release"},"content":{"rendered":"<p dir=\"ltr\" style=\"text-align: left;\">We are happy to announce that cPanel, L.L.C. has released an update for <a href=\"https:\/\/docs.cpanel.net\/ea4\/basics\/introduction-to-easyapache-4\/\" target=\"_blank\" rel=\"noopener\"><u>EasyApache 4<\/u>!<\/a> Take a look at some highlights below, and then join us on\u00a0the <a href=\"https:\/\/forums.cpanel.net\/forums\/cpanel-announcements.133\/\" target=\"_blank\" rel=\"noopener\"><u>cPanel Community Forums<\/u><\/a>, <a href=\"https:\/\/go.cpanel.net\/discord\" target=\"_blank\" rel=\"noopener\"><u>Discord<\/u><\/a>,\u00a0or\u00a0<a href=\"https:\/\/reddit.com\/r\/cpanel\/\" target=\"_blank\" rel=\"noopener\"><u>Reddit<\/u><\/a> to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels.<\/p>\n<h3 dir=\"ltr\" style=\"text-align: left;\">2021-9-22<\/h3>\n<hr class=\"wp-block-separator\" dir=\"ltr\" \/>\n<h5 dir=\"ltr\" style=\"text-align: left;\"><strong>ea-nginx<\/strong><\/h5>\n<ul dir=\"ltr\" style=\"text-align: left;\">\n<li>EA-10108: Update\u00a0ea-nginx\u00a0to 1.21.3, drop 1.21.2.<\/li>\n<li>ZC-9261: Allow include to prefix\u00a0proxy_cache_key\u00a0based on any criteria.<\/li>\n<li>ZC-9260: Move standalone includes to separate folder and bring in server includes on reverse proxy and standalone.<\/li>\n<\/ul>\n<h5 dir=\"ltr\" style=\"text-align: left;\"><strong>libcurl<\/strong><\/h5>\n<h5 dir=\"ltr\" style=\"text-align: left;\"><strong>ea-tomcat85<\/strong><\/h5>\n<ul dir=\"ltr\" style=\"text-align: left;\">\n<li>EA-10109: Update\u00a0ea-tomcat85\u00a0to 8.5.71, drop 8.5.70.<\/li>\n<\/ul>\n<h5 dir=\"ltr\" style=\"text-align: left;\"><strong>ea-apache2<\/strong><\/h5>\n<h5 dir=\"ltr\" style=\"text-align: left;\"><strong>mod_security2<\/strong><\/h5>\n<ul dir=\"ltr\" style=\"text-align: left;\">\n<li>ZC-9217: Fix the RPM path for\u00a0modsec_audit.<\/li>\n<li>ZC-8704: Build for Ubuntu, and minor changes for CentOS.<\/li>\n<\/ul>\n<hr class=\"wp-block-separator\" dir=\"ltr\" \/>\n<p dir=\"ltr\" style=\"text-align: left;\">This release includes a security patch that has been issued a fix for a CVE (Common Vulnerabilities and Exposures), the details of which are included below.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>SUMMARY<\/strong><br \/>\ncPanel, L.L.C. has updated packages for EasyApache 4 with Apache 2.4.49 and libcurl 7.79.0. This release addresses vulnerabilities related to CVE-2021-22945, CVE-2021-22946, CVE-2021-22947, CVE-2021-40438, CVE-2021-39275, CVE-2021-36160, CVE-2021-34798, and CVE-2021-33193. We strongly encourage all Apache users to upgrade to version 2.4.49 and all libcurl users to upgrade to version 7.79.0.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>AFFECTED VERSIONS<\/strong><br \/>\nAll versions of Apache through 2.4.48.<br \/>\nAll versions of libcurl through 7.78.0.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>SECURITY RATING<\/strong><br \/>\nThe National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>CVE-2021-40438 \u2013 MEDIUM<\/strong><br \/>\nApache 2.4.49<br \/>\nFixed vulnerability related to CVE-2021-40438.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>CVE-2021-39275 \u2013 MEDIUM<\/strong><br \/>\nApache 2.4.49<br \/>\nFixed vulnerability related to CVE-2021-39275.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>CVE-2021-36160 \u2013 MEDIUM<\/strong><br \/>\nApache 2.4.49<br \/>\nFixed vulnerability related to CVE-2021-36160.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>CVE-2021-34798 \u2013 MEDIUM<\/strong><br \/>\nApache 2.4.49<br \/>\nFixed vulnerability related to CVE-2021-34798.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>CVE-2021-33193 \u2013 HIGH<\/strong><br \/>\nApache 2.4.49<br \/>\nFixed vulnerability related to CVE-2021-33193.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>CVE-2021-22945 \u2013 MEDIUM<\/strong><br \/>\nlibcurl 7.79.0<br \/>\nFixed vulnerability related to CVE-2021-22945.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>CVE-2021-22946 \u2013 MEDIUM<\/strong><br \/>\nlibcurl 7.79.0<br \/>\nFixed vulnerability related to CVE-2021-22946.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>CVE-2021-22947 \u2013 MEDIUM<\/strong><br \/>\nlibcurl 7.79.0<br \/>\nFixed vulnerability related to CVE-2021-22947.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>SOLUTION<\/strong><br \/>\ncPanel, L.L.C. has released updated packages for EasyApache 4 on September 22, 2021, with Apache version 2.4.49 and libcurl 7.79.0. Unless you have enabled automatic package updates in your cron, update your system with either your package manager or WHM\u2019s Run System Update interface.<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong>REFERENCES<\/strong><br \/>\n<a href=\"https:\/\/curl.se\/changes.html\" target=\"_blank\" rel=\"noopener\">https:\/\/curl.se\/changes.html<\/a><br \/>\n<a href=\"https:\/\/downloads.apache.org\/httpd\/CHANGES_2.4.49\" target=\"_blank\" rel=\"noopener\">https:\/\/downloads.apache.org\/httpd\/CHANGES_2.4.49<\/a><br \/>\n<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22945\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22945<\/a><br \/>\n<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22946\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22946<\/a><br \/>\n<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22947\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-22947<\/a><br \/>\n<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-40438\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-40438<\/a><br \/>\n<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-39275\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-39275<\/a><br \/>\n<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-36160\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-36160<\/a><br \/>\n<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-34798\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-34798<\/a><br \/>\n<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-33193\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-33193<\/a><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">Link to the signed PGP version is below:<\/p>\n<p dir=\"ltr\" style=\"text-align: left;\"><strong><u>More Information<\/u><\/strong><\/p>\n<p dir=\"ltr\" style=\"text-align: left;\">Information about all releases this year can be found in the\u00a0<a href=\"https:\/\/docs.cpanel.net\/changelogs\/easyapache-4-change-log-2021\/\" target=\"_blank\" rel=\"noopener\"><u>2021 EasyApache 4 Changelog<\/u><\/a>\u00a0and\u00a0the\u00a0<a href=\"https:\/\/docs.cpanel.net\/ea4\/information\/easyapache-4-release-notes\/\" target=\"_blank\" rel=\"noopener\"><u>EasyApache 4 Release Notes<\/u><\/a>. You can also sign up for our\u00a0<a href=\"http:\/\/mail.cpanel.net\/mailman\/listinfo\/ea4development-announce_cpanel.net\" target=\"_blank\" rel=\"noopener\"><u>EasyApache Development<\/u><\/a>\u00a0and\u00a0<a href=\"http:\/\/mail.cpanel.net\/mailman\/listinfo\/ea4production-announce_cpanel.net\" target=\"_blank\" rel=\"noopener\"><u>EasyApache Production<\/u><\/a> mailing\u00a0lists to see when updates are pushed for our RPMs, letting you know ahead of time what will be updated in each EasyApache release.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are happy to announce that cPanel, L.L.C. has released an update for EasyApache 4! Take a look at some highlights below, and then join us on\u00a0the cPanel Community Forums, Discord,\u00a0or\u00a0Reddit to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels. &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-17350","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/17350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=17350"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/17350\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=17350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=17350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=17350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}