-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 SUMMARY cPanel, Inc. has released updated RPMs for EasyApache 4 on December 13, 2016, with PHP version 5.6.29, 7.0.14 and 7.1.0. This release addresses vulnerabilities related to CVE-2016-5094, CVE-2016-9933, CVE-2016-9934, CVE-2016-9935, and CVE-2016-9936. We strongly encourage all PHP 5.6 users to upgrade to version 5.6.29, and PHP 7.0 users to upgrade to version 7.0.14. This release of PHP 7.1 is the initial release. AFFECTED VERSIONS All versions of PHP 5.6 through version 5.6.28 All versions of PHP 7.0 through version 7.0.13 All versions of PHP 7.1 prior to the release of 7.1.0 SECURITY RATING The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs: CVE-2016-5094 - HIGH PHP 7.0.14 Fixed bug in XML related to CVE-2016-5094 PHP 7.1.0 Fixed bug in XML related to CVE-2016-5094 CVE-2016-9933 - MEDIUM PHP 7.1.0 Fixed bug in Core module related to CVE-2016-9933 CVE-2016-9934 - MEDIUM PHP 7.1.0 Fixed bug in WDDX related to CVE-2016-9934 CVE-2016-9935 - MEDIUM PHP 5.6.29 Fixed bug in WDDX related to CVE-2016-9935 PHP 7.0.14 Fixed bug in WDDX related to CVE-2016-9935 CVE-2016-9936 - HIGH PHP 7.0.14 Fixed bug in the Core module related to CVE-2016-9936 PHP 7.1.0 Fixed bug in the Core module related to CVE-2016-9936 SOLUTION cPanel, Inc. has released updated RPMs for EasyApache 4 on December 13, 2016, with a updated versions of PHP 5.6.29, 7.0.14, and 7.1.0. Unless you have enabled automatic RPM updates in your cron, update your system with either yum update or WHM's Run System Update interface. REFERENCES https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5094 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9933 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9934 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9935 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-9936 http://www.php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJYT/uCAAoJEJUhvtyr2U3f1sEQANRsavAb6Ld1Floed8cJtTc7 axkEqkfkEMVIAacncGH7k0iXXQ1RUFGOthItsCCqrea30jyFM89+tLKTpSeT3stZ IIndreexsQ8tIo4aEvoTALCw8TUF+ID7ZLQiOv/bFGl0L8VAsK82K+LUdxNKXRDw KXTz5btTHGFFsmNWZkz46mADWMAhks9w4m4x2czNuYJqSk9Sae4FfItdQwjcSRzB dW6lmW+IDqWaNLms6XgBTsKAN5rP+FJ17uME8FenMmbvRpJmk3b22UrVp6CVfnW3 690Zuw9TM7uvD4FHxEzdO8KfNezdJiI4vklp8TUR68L5+X62R8SL1XJIfsTB2MQp KBBJRphvNepy47qJtOwvkthsTnQb90xv+wTUoTpC9YgKWAJMJSjXe8QnvWtt+wcr IJqngQlG/BQcHtUOfila9ZIgLpo9Fh5ftp4txB1b2RUYD+nGy/S582Ve/kOODNi7 uaOK+XbzHMvGthsAVeoAsMzeGBgoYNbJR2BXfs9wC4YA7ueUXF/seK713WGLcuA5 zivdmhHUhjTjEo4PkplDpLJEV7QxSMlqHMab5GFSel+l5VdaDB5cI5fRQd9QEmqH +mIb5Y6eyqotIxVxRjY+dXvv+dJ33RhNISCc3gSnxWWN2LuVfHGbkyi5wMn+2Ul5 104x3JQHBz4QqXo+YbV1 =9mND -----END PGP SIGNATURE-----