{"id":7629,"date":"2018-12-12T10:50:50","date_gmt":"2018-12-12T07:50:50","guid":{"rendered":"http:\/\/news.cpanel.com\/?p=55381"},"modified":"2018-12-12T10:50:50","modified_gmt":"2018-12-12T07:50:50","slug":"easyapache-4-2018-12-11-security-release","status":"publish","type":"post","link":"https:\/\/afaghhosting.net\/blog\/easyapache-4-2018-12-11-security-release\/","title":{"rendered":"EasyApache 4 2018-12-11 Security Release"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/afaghhosting.net\/blog\/wp-content\/uploads\/2018\/12\/easyapache-4-2018-12-11-security-release.jpg\" class=\"ff-og-image-inserted\" alt=\"\" title=\"\"><\/div>\n<p><span><strong>SUMMARY<\/strong><\/span><br \/>cPanel, L.L.C. has updated RPMs for EasyApache 4 with PHP versions 5.6.39, 7.0.33, 7.1.25, and 7.2.13 This release addresses vulnerabilities related to CVE-2018-19518 and CVE-2018-19935. We strongly encourage all PHP 5.6 users to upgrade to version 5.6.39, all PHP 7.0 users to upgrade to version 7.0.33, all PHP 7.1 users to upgrade to version 7.1.25, and all PHP 7.2 users to upgrade to version 7.2.13.<\/p>\n<p><span><strong>AFFECTED VERSIONS<\/strong><\/span><br \/>All versions of PHP 5.6 through 5.6.38<br \/>All versions of PHP 7.0 through 7.0.32<br \/>All versions of PHP 7.1 through 7.1.24<br \/>All versions of PHP 7.2 through 7.2.12<\/p>\n<p><strong>SECURITY RATING<\/strong><br \/>The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:<\/p>\n<p>CVE-2018-19518 \u2013 MEDIUM<br \/>PHP 5.6.39<br \/>Fixed bug in IMAP module related to CVE-2018-19518<\/p>\n<p>PHP 7.0.33<br \/>Fixed bug in IMAP module related to CVE-2018-19518<\/p>\n<p>PHP 7.1.25<br \/>Fixed bug in IMAP module related to CVE-2018-19518<\/p>\n<p>PHP 7.2.13<br \/>Fixed bug in IMAP module related to CVE-2018-19518<\/p>\n<p>CVE-2018-19935 \u2013 MEDIUM<br \/>PHP 5.6.39<br \/>Fixed bug in IMAP module related to CVE-2018-19935<\/p>\n<p>PHP 7.0.33<br \/>Fixed bug in IMAP module related to CVE-2018-19935<\/p>\n<p><strong>SOLUTION<\/strong><br \/>cPanel, L.L.C. has released updated RPMs for EasyApache 4 on December 11, 2018, with updated versions of PHP versions 5.6.39, 7.0.33, 7.1.25, and 7.2.13. Unless you have enabled automatic RPM updates in your cron, update your system with either yum update or WHM\u2019s Run System Update interface.<\/p>\n<p><span><strong>REFERENCES<\/strong><\/span><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-19935\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-19935<\/a><br \/><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-19518\" target=\"_blank\" rel=\"noopener\">https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2018-19518<\/a><br \/><a href=\"http:\/\/www.php.net\/ChangeLog-5.php\" target=\"_blank\" rel=\"noopener\">http:\/\/www.php.net\/ChangeLog-5.php<\/a><br \/><a href=\"http:\/\/www.php.net\/ChangeLog-7.php\" target=\"_blank\" rel=\"noopener\">http:\/\/www.php.net\/ChangeLog-7.php<\/a><\/p>\n<p>For the PGP-signed message, please see\u00a0<a href=\"http:\/\/news.cpanel.com\/wp-content\/uploads\/2018\/12\/EA4-2018-12-11-CVE-signed.txt\" target=\"_blank\" rel=\"noopener\">EA4 2018-12-11 CVE signed<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SUMMARYcPanel, L.L.C. has updated RPMs for EasyApache 4 with PHP versions 5.6.39, 7.0.33, 7.1.25, and 7.2.13 This release addresses vulnerabilities related to CVE-2018-19518 and CVE-2018-19935. We strongly encourage all PHP 5.6 users to upgrade to version 5.6.39, all PHP 7.0 users to upgrade to version 7.0.33, all PHP 7.1 users to upgrade to version 7.1.25, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":["post-7629","post","type-post","status-publish","format-standard","hentry","category-cpanel-news"],"_links":{"self":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/7629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/comments?post=7629"}],"version-history":[{"count":0,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/posts\/7629\/revisions"}],"wp:attachment":[{"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/media?parent=7629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/categories?post=7629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/afaghhosting.net\/blog\/wp-json\/wp\/v2\/tags?post=7629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}