{"id":3214,"date":"2018-04-04T09:17:55","date_gmt":"2018-04-04T05:17:55","guid":{"rendered":"http:\/\/news.cpanel.com\/?p=54683"},"modified":"2018-04-04T09:17:55","modified_gmt":"2018-04-04T05:17:55","slug":"easyapache-2018-04-03-maintenance-release","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/easyapache-2018-04-03-maintenance-release\/","title":{"rendered":"EasyApache 2018-04-03 Maintenance Release"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2018\/04\/easyapache-2018-04-03-maintenance-release.jpg\" class=\"ff-og-image-inserted\" alt=\"\" title=\"\"><\/div>\n<p>cPanel, Inc. has updated RPMs for EasyApache 4 with Apache version 2.4.33 and PHP versions 5.6.35, 7.0.29, 7.1.16, and 7.2.4 and released EasyApache 3.36.3 with Apache version 2.4.33 and PHP 5.6.35 on April 3, 2018. This release addresses vulnerabilities related to CVE-2017-15710, CVE-2018-1283, CVE-2018-1303, CVE-2018-1301, CVE-2017-15715, CVE-2018-1312, and CVE-2018-1302. We strongly encourage all Apache 2.4 users to upgrade to version 2.4.33 and all PHP 5.6 users to update to version 5.6.35, PHP 7.0 users to update to version 7.0.29, PHP 7.1 users to update to version 7.1.16, and PHP 7.2 users to update to version 7.2.4.<\/p>\n<p>AFFECTED VERSIONS<br \/>All versions of Apache 2.4 through 2.4.29<br \/>All versions of PHP 5.6 through 5.6.34<br \/>All versions of PHP 7.0 through 7.0.28<br \/>All versions of PHP 7.1 through 7.1.15<br \/>All versions of PHP 7.2 through 7.2.3<\/p>\n<p>SECURITY RATING<br \/>The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:<\/p>\n<p>CVE-2018-1301 \u2013 MEDIUM<br \/>Apache 2.4.33<br \/>Fixed bug in core related to CVE-2018-1301<\/p>\n<p>CVE-2018-1302 \u2013 MEDIUM<br \/>Apache 2.4.33<br \/>Fixed bug in mod_http2 related to CVE-2018-1302<\/p>\n<p>CVE-2018-1303 \u2013 MEDIUM<br \/>Apache 2.4.33<br \/>Fixed bug in mod_cache_socache related to CVE-2018-1303<\/p>\n<p>CVE-2017-15710 \u2013 MEDIUM<br \/>Apache 2.4.33<br \/>Fixed bug in mod_authnz_ldap related to CVE-2017-15710<\/p>\n<p>CVE-2018-1283 \u2013 MEDIUM<br \/>Apache 2.4.33<br \/>Fixed bug in mod_session related to CVE-2018-1283<\/p>\n<p>CVE-2017-15715 \u2013 MEDIUM<br \/>Apache 2.4.33<br \/>Fixed bug in core related to CVE-2017-15715<\/p>\n<p>CVE-2018-1312 \u2013 MEDIUM<br \/>Apache 2.4.33<br \/>Fixed bug in mod_auth_digest related to CVE-2018-1312<\/p>\n<p>SOLUTION<br \/>cPanel, Inc. has released updated RPMs for EasyApache 4 on April 3, 2018, with Apache version 2.4.33 and PHP versions 5.6.35, 7.0.29, 7.1.16, and 7.2.4. Unless you have enabled automatic RPM updates in your cron, update your system with either yum update or WHM\u2019s Run System Update interface.<\/p>\n<p>cPanel, Inc. has released EasyApache 3.6.3 with Apache version 2.4.33 and PHP version 5.6.35. Unless you have disabled EasyApache updates, the EasyApache application updates to the latest version when launched. Run EasyApache to rebuild your profile with the latest version of Apache and PHP.<\/p>\n<p>REFERENCES<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-1301<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-1302<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-1303<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-15710<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-1283<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-15715<br \/>https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-1312<br \/>http:\/\/www.apache.org\/dist\/httpd\/CHANGES_2.4.33<br \/>http:\/\/www.php.net\/ChangeLog-5.php<br \/>http:\/\/www.php.net\/ChangeLog-7.php<\/p>\n<p>For the PGP signed message, please see <a href=\"http:\/\/news.cpanel.com\/wp-content\/uploads\/2018\/04\/EA4-EA3-2018-4-3-CVE.txt\" target=\"_blank\" rel=\"noopener\">EA4 EA3 2018-4-3 CVE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>cPanel, Inc. has updated RPMs for EasyApache 4 with Apache version 2.4.33 and PHP versions 5.6.35, 7.0.29, 7.1.16, and 7.2.4 and released EasyApache 3.36.3 with Apache version 2.4.33 and PHP 5.6.35 on April 3, 2018. This release addresses vulnerabilities related to CVE-2017-15710, CVE-2018-1283, CVE-2018-1303, CVE-2018-1301, CVE-2017-15715, CVE-2018-1312, and CVE-2018-1302. We strongly encourage all Apache 2.4 &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-3214","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/3214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=3214"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/3214\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=3214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=3214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=3214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}