{"id":2794,"date":"2018-01-26T13:06:02","date_gmt":"2018-01-26T10:06:02","guid":{"rendered":"http:\/\/news.cpanel.com\/?p=54541"},"modified":"2018-01-26T13:06:02","modified_gmt":"2018-01-26T10:06:02","slug":"easyapache-2018-01-25-security-release","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/easyapache-2018-01-25-security-release\/","title":{"rendered":"EasyApache 2018-01-25 Security Release"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2018\/01\/easyapache-2018-01-25-security-release.jpg\" class=\"ff-og-image-inserted\" alt=\"\" title=\"\"><\/div>\n<p>SUMMARY<br \/>cPanel, Inc. has updated RPMs for EasyApache 4 with cURL version 7.58.0 on January 25, 2018. This release addresses vulnerabilities related to CVE-2018-1000007. We strongly encourage cURL users to upgrade to version 7.58.0.<\/p>\n<p>AFFECTED VERSIONS<br \/>All versions of cURL through 7.57.0<\/p>\n<p>SECURITY RATING<br \/>The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:<\/p>\n<p>CVE-2018-1000007 \u2013 MEDIUM<br \/>cURL 7.58.0<br \/>Fixed bug in authorization: headers related to CVE-2018-1000007<\/p>\n<p>SOLUTION<br \/>cPanel, Inc. has released updated RPMs for EasyApache 4 on January 25, 2018, with a updated versions of cURL 7.58.0. Unless you have enabled automatic RPM updates in your cron, update your system with either yum update or WHM\u2019s Run System Update interface.<\/p>\n<p>REFERENCES<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-1000007<br \/>https:\/\/curl.haxx.se\/changes.html<br \/>https:\/\/curl.haxx.se\/docs\/adv_2018-b3bf.html<\/p>\n<p>For the PGP-signed message, please see <a href=\"http:\/\/news.cpanel.com\/wp-content\/uploads\/2018\/01\/EA4-2018-1-25-CVE.txt\" target=\"_blank\" rel=\"noopener\">EA4 2018-1-25 CVE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SUMMARYcPanel, Inc. has updated RPMs for EasyApache 4 with cURL version 7.58.0 on January 25, 2018. This release addresses vulnerabilities related to CVE-2018-1000007. We strongly encourage cURL users to upgrade to version 7.58.0. AFFECTED VERSIONSAll versions of cURL through 7.57.0 SECURITY RATINGThe National Vulnerability Database (NIST) has given the following severity ratings to these CVEs: &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-2794","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/2794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=2794"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/2794\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=2794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=2794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=2794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}