{"id":50187,"date":"2023-10-19T03:20:36","date_gmt":"2023-10-19T00:20:36","guid":{"rendered":"https:\/\/news.cpanel.com\/?p=62321"},"modified":"2023-10-19T03:20:36","modified_gmt":"2023-10-19T00:20:36","slug":"easyapache4-2023-10-18-maintenance-and-security-release","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/easyapache4-2023-10-18-maintenance-and-security-release\/","title":{"rendered":"EasyApache4 2023-10-18 Maintenance and Security Release"},"content":{"rendered":"<p>cPanel, L.L.C. has released a security update for&nbsp;<a href=\"https:\/\/docs.cpanel.net\/ea4\/basics\/introduction-to-easyapache-4\/\" target=\"_blank\" rel=\"noopener\">EasyApache 4!<\/a>&nbsp; Take a look at some highlights below, and then join us on&nbsp;the&nbsp;<a href=\"https:\/\/forums.cpanel.net\/forums\/cpanel-announcements.133\/\" target=\"_blank\" rel=\"noopener\">cPanel Community Forums<\/a>,&nbsp;<a href=\"https:\/\/go.cpanel.net\/discord\" target=\"_blank\" rel=\"noopener\">Discord<\/a>,&nbsp;or&nbsp;<a href=\"https:\/\/reddit.com\/r\/cpanel\/\" target=\"_blank\" rel=\"noopener\">Reddit<\/a>&nbsp;to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels.<\/p>\n<ul>\n<li><strong>ea-freetds<\/strong>\n<ul>\n<li>EA-11745: Update ea-freetds from v1.4.2 to v1.4.3<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>ea-nginx<\/strong><\/li>\n<li><strong>ea-nginx-standalone<\/strong>\n<ul>\n<li>EA-11530: Disable file protect when in standalone mode<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>ea-nodejs18<\/strong>\n<ul>\n<li>EA-11746: Update ea-nodejs18 from v18.18.0 to v18.18.2\n<ul>\n<li>undici \u2013 Cookie headers are not cleared in cross-domain redirect in undici-fetch (High) \u2013 (CVE-2023-45143)<\/li>\n<li>nghttp2 \u2013 HTTP\/2 Rapid Reset (High) \u2013 (CVE-2023-44487)<\/li>\n<li>Permission model improperly protects against path traversal (High) \u2013 (CVE-2023-39331)<\/li>\n<li>Path traversal through path stored in Uint8Array (High) \u2013 (CVE-2023-39332)<\/li>\n<li>Integrity checks according to policies can be circumvented (Medium) \u2013 (CVE-2023-38552)<\/li>\n<li>Code injection via WebAssembly export names (Low) \u2013 (CVE-2023-39333)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>ea-nodejs20<\/strong>\n<ul>\n<li>EA-11747: Update ea-nodejs20 from v20.8.0 to v20.8.1\n<ul>\n<li>undici \u2013 Cookie headers are not cleared in cross-domain redirect in undici-fetch (High) \u2013 (CVE-2023-45143)<\/li>\n<li>nghttp2 \u2013 HTTP\/2 Rapid Reset (High) \u2013 (CVE-2023-44487)<\/li>\n<li>Permission model improperly protects against path traversal (High) \u2013 (CVE-2023-39331)<\/li>\n<li>Path traversal through path stored in Uint8Array (High) \u2013 (CVE-2023-39332)<\/li>\n<li>Integrity checks according to policies can be circumvented (Medium) \u2013 (CVE-2023-38552)<\/li>\n<li>Code injection via WebAssembly export names (Low) \u2013 (CVE-2023-39333)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>ea-oniguruma<\/strong>\n<ul>\n<li>EA-11748: Update ea-oniguruma from v6.9.8 to v6.9.9<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>ea-tomcat85<\/strong>\n<ul>\n<li>EA-11749: Update ea-tomcat85 from v8.5.94 to v8.5.95<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>ea-profiles-cpanel<\/strong>\n<ul>\n<li>ZC-11253: Update EA4 profiles \u2013 Add ea-php82, Remove ea-php80<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>SUMMARY<\/strong><\/p>\n<p>cPanel, L.L.C. has updated packages for EasyApache 4 with NodeJS versions 18.18.2 and 20.8.1. This release addresses vulnerabilities related to CVE-2023-45143, CVE-2023-44487, CVE-2023-39331, CVE-2023-39332, CVE-2023-38552, and CVE-2023-39333. We strongly encourage all NodeJS 18 users to upgrade to version 18.18.2 and all NodeJS 20 users to upgrade to version 20.8.1<\/p>\n<p><strong>AFFECTED VERSIONS<br \/><\/strong>All versions of NodeJS 18 through 18.18.1.<br \/>All versions of NodeJS 20 through 20.8.0.<\/p>\n<p><strong>SECURITY RATING<br \/><\/strong>The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:<\/p>\n<p>CVE-2023-45143 \u2013 HIGH<br \/>NodeJS 18.18.2<br \/>Fixed vulnerability related to CVE-2023-45143.<\/p>\n<p>NodeJS 20.8.1<br \/>Fixed vulnerability related to CVE-2023-45143.<\/p>\n<p>CVE-2023-44487 \u2013 HIGH<br \/>NodeJS 18.18.2<br \/>Fixed vulnerability related to CVE-2023-44487.<\/p>\n<p>NodeJS 20.8.1<br \/>Fixed vulnerability related to CVE-2023-44487.<\/p>\n<p>CVE-2023-39331 \u2013 HIGH<br \/>NodeJS 18.18.2<br \/>Fixed vulnerability related to CVE-2023-39331.<\/p>\n<p>NodeJS 20.8.1<br \/>Fixed vulnerability related to CVE-2023-39331.<\/p>\n<p>CVE-2023-39332 \u2013 HIGH<br \/>NodeJS 18.18.2<br \/>Fixed vulnerability related to CVE-2023-39332.<\/p>\n<p>NodeJS 20.8.1<br \/>Fixed vulnerability related to CVE-2023-39332.<\/p>\n<p>CVE-2023-38552 \u2013 MEDIUM<br \/>NodeJS 18.18.2<br \/>Fixed vulnerability related to CVE-2023-38552.<\/p>\n<p>NodeJS 20.8.1<br \/>Fixed vulnerability related to CVE-2023-38552.<\/p>\n<p>CVE-2023-39333 \u2013 LOW<br \/>NodeJS 18.18.2<br \/>Fixed vulnerability related to CVE-2023-39333.<\/p>\n<p>NodeJS 20.8.1<br \/>Fixed vulnerability related to CVE-2023-39333.<\/p>\n<p><strong>SOLUTION<br \/><\/strong>cPanel, L.L.C. has released updated packages for EasyApache 4 on October 18, 2023, with NodeJS versions 18.18.2 and 20.8.1. Unless you have enabled automatic package updates in your cron, update your system with either your package manager or WHM\u2019s Run System Update interface.<\/p>\n<p><strong>REFERENCES<br \/><\/strong><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-45143 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2023-45143<br \/><\/a><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-44487 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2023-44487<br \/><\/a><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-39331 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2023-39331<br \/><\/a><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-39332 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2023-39332<br \/><\/a><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-39333 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2023-39333<br \/><\/a><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2023-38552 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2023-38552<br \/><\/a><a href=\"https:\/\/github.com\/nodejs\/node\/blob\/main\/doc\/changelogs\/CHANGELOG_V18.md#18.18.2 \" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/nodejs\/node\/blob\/main\/doc\/changelogs\/CHANGELOG_V18.md#18.18.2<br \/><\/a><a href=\"https:\/\/github.com\/nodejs\/node\/blob\/main\/doc\/changelogs\/CHANGELOG_V20.md#20.8.1\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/nodejs\/node\/blob\/main\/doc\/changelogs\/CHANGELOG_V20.md#20.8.1<\/a><\/p>\n<p><a href=\"https:\/\/news.cpanel.com\/wp-content\/uploads\/2023\/10\/EA4-2023-10-18-CVE.signed.txt\" target=\"_blank\" rel=\"noopener\">https:\/\/news.cpanel.com\/wp-content\/uploads\/2023\/10\/EA4-2023-10-18-CVE.signed.txt<\/a><\/p>\n<p>Information about all releases this year can be found in the&nbsp;<a href=\"https:\/\/docs.cpanel.net\/changelogs\/easyapache-4-change-log-2023\/\" target=\"_blank\" rel=\"noopener\">2023 EasyApache 4 Changelog<\/a>&nbsp;and&nbsp;the&nbsp;<a href=\"https:\/\/docs.cpanel.net\/ea4\/information\/easyapache-4-release-notes\/\" target=\"_blank\" rel=\"noopener\">EasyApache 4 Release Notes<\/a>. You can also sign up for our&nbsp;<a href=\"http:\/\/mail.cpanel.net\/mailman\/listinfo\/ea4development-announce_cpanel.net\" target=\"_blank\" rel=\"noopener\">EasyApache Development<\/a>&nbsp;and&nbsp;<a href=\"http:\/\/mail.cpanel.net\/mailman\/listinfo\/ea4production-announce_cpanel.net\" target=\"_blank\" rel=\"noopener\">EasyApache Production<\/a>&nbsp;mailing&nbsp;lists to see when updates are pushed for our RPMs, letting you know ahead of time what will be updated in each EasyApache release.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>cPanel, L.L.C. has released a security update for&nbsp;EasyApache 4!&nbsp; Take a look at some highlights below, and then join us on&nbsp;the&nbsp;cPanel Community Forums,&nbsp;Discord,&nbsp;or&nbsp;Reddit&nbsp;to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels. ea-freetds EA-11745: Update ea-freetds from v1.4.2 to v1.4.3 ea-nginx &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-50187","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/50187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=50187"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/50187\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=50187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=50187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=50187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}