Newsroom

EasyApache 4 January 4 Release

We are happy to announce that cPanel, L.L.C. has released an update for EasyApache 4!  Take a look at some highlights below, and then join us on the cPanel Community ForumsDiscord, or Reddit to talk about this update and much more. If you have additional questions, feel free to reach out on one of our social channels.

  • ea-passenger-src
    • EA-11116: Update ea-passenger-src from v6.0.15 to v6.0.16
  • ea-apache24-mod-passenger
    • EA-11116: ea-passenger-src was updated from v6.0.15 to v6.0.16
  • ea-ruby27-passenger
    • EA-11117: Update ea-ruby27-passenger from v6.0.15 to v6.0.16
  • ea-redis62
    • EA-11106: Update ea-redis62 from v6.2.7 to v6.2.8
  • ea-libcurl
    • EA-11118: Update libcurl from v7.86.0 to v7.87.0
    • CVE-2022-43552: HTTP Proxy deny use-after-free
    • CVE-2022-43551: Another HSTS bypass via IDN
  • scl-ioncube12
    • EA-11120: Update scl-ioncube12 from v12.0.4 to v12.0.5
  • ea-nginx
    • EA-11087: Guard against bad userdata where a domain is considered an addon domain and subdomain

This release includes a security patch that has been issued a fix for a CVE (Common Vulnerabilities and Exposures), the details of which are included below.

SUMMARY
cPanel, L.L.C. has updated packages for EasyApache 4 with libcurl version 7.87.0. This release addresses vulnerabilities related to CVE-2022-43551 and CVE-2022-43552. We strongly encourage all libcurl users to update to version 7.87.0.

AFFECTED VERSIONS
All versions of libcurl through 7.86.0.

SECURITY RATING
The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:

CVE-2022-43551 – MEDIUM
libcurl 7.87.0
Fixed vulnerability related to CVE-2022-43551.

CVE-2022-43552 – MEDIUM
libcurl 7.87.0
Fixed vulnerability related to CVE-2022-43552.

SOLUTION
cPanel, L.L.C. has released updated packages for EasyApache 4 on January 4, 2023, with libcurl version 7.87.0. Unless you have enabled automatic package updates in your cron, update your system with either your package manager or WHM’s Run System Update interface.

REFERENCES
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43551
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552
https://curl.se/changes.html

https://news.cpanel.com/wp-content/uploads/2023/01/EA4-2023-1-4-CVE.signed.txt