{"id":60522,"date":"2024-11-25T23:44:59","date_gmt":"2024-11-25T20:44:59","guid":{"rendered":"https:\/\/news.cpanel.com\/?p=63425"},"modified":"2024-11-25T23:44:59","modified_gmt":"2024-11-25T20:44:59","slug":"easyapache4-2024-11-25-maintenance-and-security-release","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/easyapache4-2024-11-25-maintenance-and-security-release\/","title":{"rendered":"EasyApache4 2024-11-25 Maintenance and Security Release"},"content":{"rendered":"<p>cPanel, L.L.C. has released an update for&nbsp;<a href=\"https:\/\/docs.cpanel.net\/ea4\/\" title target=\"_blank\" rel=\"noopener\">EasyApache 4!<\/a>&nbsp; Take a look at some highlights below, and then join us on&nbsp;the&nbsp;<a href=\"https:\/\/support.cpanel.net\/hc\/en-us\/community\/topics\/19044590137239-cPanel-Announcements\" target=\"_blank\" rel=\"noopener\">cPanel Community Forums,<\/a>&nbsp;<a href=\"https:\/\/go.cpanel.net\/discord\" target=\"_blank\" rel=\"noopener\">Discord<\/a>,&nbsp;or&nbsp;<a href=\"https:\/\/reddit.com\/r\/cpanel\/\" target=\"_blank\" rel=\"noopener\">Reddit<\/a>&nbsp;to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels.<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>ea-php81<\/strong><\/li>\n<li><strong>ea-php81-meta<\/strong>\n<ul class=\"wp-block-list\">\n<li>EA-12576: Update ea-php81 from v8.1.30 to v8.1.31\n<ul class=\"wp-block-list\">\n<li>\u2013 (Single byte overread with convert.quoted-printable-decode filter). (CVE-2024-11233)<\/li>\n<li>\u2013 (Configuring a proxy in a stream context might allow for CRLF injection in URIs). (CVE-2024-11234)<\/li>\n<li>\u2013 (Integer overflow in the dblib quoter causing OOB writes). (CVE-2024-11236)<\/li>\n<li>\u2013 (Integer overflow in the firebird quoter causing OOB writes). (CVE-2024-11236)<\/li>\n<li>\u2013 (Leak partial content of the heap through heap buffer over-read). (CVE-2024-8929)<\/li>\n<li>\u2013 (OOB access in ldap_escape). (CVE-2024-8932)&nbsp;<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><strong>ea-php82<\/strong><\/li>\n<li><strong>ea-php82-meta<\/strong>\n<ul class=\"wp-block-list\">\n<li>EA-12577: Update ea-php82 from v8.2.25 to v8.2.26\n<ul class=\"wp-block-list\">\n<li>\u2013 (Single byte overread with convert.quoted-printable-decode filter). (CVE-2024-11233)<\/li>\n<li>\u2013 (Configuring a proxy in a stream context might allow for CRLF injection in URIs). (CVE-2024-11234)<\/li>\n<li>\u2013 (Integer overflow in the dblib quoter causing OOB writes). (CVE-2024-11236)<\/li>\n<li>\u2013 (Integer overflow in the firebird quoter causing OOB writes). (CVE-2024-11236)<\/li>\n<li>\u2013 (Leak partial content of the heap through heap buffer over-read). (CVE-2024-8929)<\/li>\n<li>\u2013 (OOB access in ldap_escape). (CVE-2024-8932)&nbsp;<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><strong>ea-php83<\/strong><\/li>\n<li><strong>ea-php83-meta<\/strong>\n<ul class=\"wp-block-list\">\n<li>EA-12578: Update ea-php83 from v8.3.13 to v8.3.14\n<ul class=\"wp-block-list\">\n<li>\u2013 (Single byte overread with convert.quoted-printable-decode filter). (CVE-2024-11233)<\/li>\n<li>\u2013 (Configuring a proxy in a stream context might allow for CRLF injection in URIs). (CVE-2024-11234)<\/li>\n<li>\u2013 (Integer overflow in the dblib quoter causing OOB writes). (CVE-2024-11236)<\/li>\n<li>\u2013 (Integer overflow in the firebird quoter causing OOB writes). (CVE-2024-11236)<\/li>\n<li>\u2013 (Leak partial content of the heap through heap buffer over-read). (CVE-2024-8929)<\/li>\n<li>\u2013 (OOB access in ldap_escape). (CVE-2024-8932)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul class=\"wp-block-list\">\n<li><strong>ea-nodejs20<\/strong>\n<ul class=\"wp-block-list\">\n<li>EA-12565: Update ea-nodejs20 from v20.18.0 to v20.18.1<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><strong>SUMMARY<\/strong><\/p>\n<p>cPanel, L.L.C. has updated packages for EasyApache 4 with updated versions of PHP 8.1, 8.2, and 8.3. This release addresses vulnerabilities related to CVE-2024-11233, CVE-2024-11234, CVE-2024-11236, CVE-2024-8929, and CVE-2024-8932. We strongly encourage all PHP 8.1 users to update to version 8.1.31, all PHP 8.2 users to update to version 8.2.26, and all PHP 8.3 users to update to version 8.3.14.<\/p>\n<p><strong>AFFECTED VERSIONS<br \/><\/strong>All versions of PHP 8.1 through 8.1.30<br \/>All versions of PHP 8.2 through 8.2.25<br \/>All versions of PHP 8.3 through 8.3.13<\/p>\n<p><strong>SECURITY RATING<br \/><\/strong>The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:<\/p>\n<p><strong>CVE-2024-11233 \u2013 MEDIUM<br \/><\/strong>PHP 8.1.31<br \/>Fixed vulnerability related to CVE-2024-11233<\/p>\n<p>PHP 8.2.26<br \/>Fixed vulnerability related to CVE-2024-11233<\/p>\n<p>PHP 8.3.14<br \/>Fixed vulnerability related to CVE-2024-11233<\/p>\n<p><strong>CVE-2024-11234 \u2013 MEDIUM<br \/><\/strong>PHP 8.1.31<br \/>Fixed vulnerability related to CVE-2024-11234<\/p>\n<p>PHP 8.2.26<br \/>Fixed vulnerability related to CVE-2024-11234<\/p>\n<p>PHP 8.3.14<br \/>Fixed vulnerability related to CVE-2024-11234<\/p>\n<p><strong>CVE-2024-11236 \u2013 MEDIUM<br \/><\/strong>PHP 8.1.31<br \/>Fixed vulnerability related to CVE-2024-11236<\/p>\n<p>PHP 8.2.26<br \/>Fixed vulnerability related to CVE-2024-11236<\/p>\n<p>PHP 8.3.14<br \/>Fixed vulnerability related to CVE-2024-11236<\/p>\n<p><strong>CVE-2024-8929 \u2013 MEDIUM<br \/><\/strong>PHP 8.1.31<br \/>Fixed vulnerability related to CVE-2024-8929<\/p>\n<p>PHP 8.2.26<br \/>Fixed vulnerability related to CVE-2024-8929<\/p>\n<p>PHP 8.3.14<br \/>Fixed vulnerability related to CVE-2024-8929<\/p>\n<p><strong>CVE-2024-8932 \u2013 CRITICAL<br \/><\/strong>PHP 8.1.31<br \/>Fixed vulnerability related to CVE-2024-8932<\/p>\n<p>PHP 8.2.26<br \/>Fixed vulnerability related to CVE-2024-8932<\/p>\n<p>PHP 8.3.14<br \/>Fixed vulnerability related to CVE-2024-8932<\/p>\n<p><strong>SOLUTION<br \/><\/strong>cPanel, L.L.C. has released updated packages for EasyApache 4 on November 25, 2024, with PHP versions 8.1.31, 8.2.26, and 8.3.14. Unless you have enabled automatic package updates in your cron, update your system with either your package manager or WHM\u2019s Run System Update interface.<\/p>\n<p><strong>REFERENCES<\/strong><br \/><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-11233 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-11233<br \/><\/a><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-11234 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-11234<br \/><\/a><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-11236 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-11236<br \/><\/a><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-8929 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-8929<br \/><\/a><a href=\"https:\/\/www.cve.org\/CVERecord?id=CVE-2024-8932 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.cve.org\/CVERecord?id=CVE-2024-8932<br \/><\/a><a href=\"https:\/\/www.php.net\/ChangeLog-8.php#8.1.31 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.php.net\/ChangeLog-8.php#8.1.31<br \/><\/a><a href=\"https:\/\/www.php.net\/ChangeLog-8.php#8.2.26 \" target=\"_blank\" rel=\"noopener\">https:\/\/www.php.net\/ChangeLog-8.php#8.2.26<br \/><\/a><a href=\"https:\/\/www.php.net\/ChangeLog-8.php#8.3.14\" target=\"_blank\" rel=\"noopener\">https:\/\/www.php.net\/ChangeLog-8.php#8.3.14<\/a><\/p>\n<p>Information about all releases this year can be found in the&nbsp;<a href=\"https:\/\/docs.cpanel.net\/changelogs\/easyapache-4-change-log-2024\/\" target=\"_blank\" rel=\"noopener\">2024 EasyApache 4 Changelog&nbsp;<\/a>and&nbsp;the&nbsp;<a href=\"https:\/\/docs.cpanel.net\/ea4\/information\/easyapache-4-release-notes\/\" target=\"_blank\" rel=\"noopener\">EasyApache 4 Release Notes<\/a><\/p>\n<p>GPG signed copy of this announcement:<\/p>\n<p><a href=\"https:\/\/news.cpanel.com\/wp-content\/uploads\/2024\/11\/EA4-2024-11-25-CVE.signed.txt\" target=\"_blank\" rel=\"noopener\">https:\/\/news.cpanel.com\/wp-content\/uploads\/2024\/11\/EA4-2024-11-25-CVE.signed.txt<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>cPanel, L.L.C. has released an update for&nbsp;EasyApache 4!&nbsp; Take a look at some highlights below, and then join us on&nbsp;the&nbsp;cPanel Community Forums,&nbsp;Discord,&nbsp;or&nbsp;Reddit&nbsp;to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels. ea-php81 ea-php81-meta EA-12576: Update ea-php81 from v8.1.30 to v8.1.31 \u2013 &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-60522","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=60522"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/60522\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=60522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=60522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=60522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}