-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 SUMMARY cPanel, Inc. has released updated RPMs for EasyApache 4 on July 11, 2017, with PHP versions 5.6.31, 7.0.21, and 7.1.7. This release addresses vulnerabilities related to CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229, and CVE-2017-7890. We strongly encourage all PHP 5.6 users to upgrade to version 5.6.31, all PHP 7.0 users to upgrade to version 7.0.21, and all PHP 7.1 users to upgrade to version 7.1.7. AFFECTED VERSIONS All versions of PHP 5.6 through 5.6.30 All versions of PHP 7.0 through 7.0.20 All versions of PHP 7.1 through 7.1.6 SECURITY RATING The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs: CVE-2017-9224 - HIGH PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9224 PHP 7.0.21 Fixed bug in mbstring extension related to CVE-2017-9224 PHP 7.1.7 Fixed bug in mbstring extension related to CVE-2017-9224 CVE-2017-9226 - HIGH PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9226 PHP 7.0.21 Fixed bug in mbstring extension related to CVE-2017-9226 PHP 7.1.7 Fixed bug in mbstring extension related to CVE-2017-9226 CVE-2017-9227 - HIGH PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9227 PHP 7.0.21 Fixed bug in mbstring extension related to CVE-2017-9227 PHP 7.1.7 Fixed bug in mbstring extension related to CVE-2017-9227 CVE-2017-9228 - HIGH PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9228 PHP 7.0.21 Fixed bug in mbstring extension related to CVE-2017-9228 PHP 7.1.7 Fixed bug in mbstring extension related to CVE-2017-9228 CVE-2017-9229 - MEDIUM PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9229 PHP 7.0.21 Fixed bug in mbstring extension related to CVE-2017-9229 PHP 7.1.7 Fixed bug in mbstring extension related to CVE-2017-9229 CVE-2017-7890 - MEDIUM PHP 5.6.31 Fixed bug in GD module related to CVE-2017-7890 PHP 7.0.21 Fixed bug in GD module related to CVE-2017-7890 PHP 7.1.7 Fixed bug in GD module related to CVE-2017-7890 SOLUTION cPanel, Inc. has released updated RPMs for EasyApache 4 on July 11, 2017, with updated versions of 5.6, 7.0, and 7.1. Unless you have enabled automatic RPM updates in your cron, update your system with either yum update or WHM's Run System Update interface. REFERENCES https://nvd.nist.gov/vuln/detail/CVE-2017-9224 https://nvd.nist.gov/vuln/detail/CVE-2017-9226 https://nvd.nist.gov/vuln/detail/CVE-2017-9227 https://nvd.nist.gov/vuln/detail/CVE-2017-9228 https://nvd.nist.gov/vuln/detail/CVE-2017-9229 https://nvd.nist.gov/vuln/detail/CVE-2017-7890 http://php.net/ChangeLog-5.php http://www.php.net/ChangeLog-7.php SUMMARY cPanel, Inc. has released EasyApache 3.34.13 with PHP version 5.6.31. This release addresses vulnerabilities related to CVE-2017-9224, CVE-2017-9226, CVE-2017-9227, CVE-2017-9228, CVE-2017-9229, and CVE-2017-7890. We strongly encourage all PHP 5.6 users to upgrade to version 5.6.31. AFFECTED VERSIONS All versions of PHP 5.6 through version 5.6.30 SECURITY RATING The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs: CVE-2017-9224 - HIGH PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9224 CVE-2017-9226 - HIGH PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9226 CVE-2017-9227 - HIGH PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9227 CVE-2017-9228 - HIGH PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9228 CVE-2017-9229 - MEDIUM PHP 5.6.31 Fixed bug in mbstring extension related to CVE-2017-9229 CVE-2017-7890 - MEDIUM PHP 5.6.31 Fixed bug in GD module related to CVE-2017-7890 SOLUTION cPanel, Inc. has released EasyApache 3.34.13 with an updated version of PHP 5.6.31. Unless you have disabled EasyApache updates, the EasyApache application updates to the latest version when launched. Run EasyApache to rebuild your profile with the latest version of PHP. REFERENCES https://nvd.nist.gov/vuln/detail/CVE-2017-9224 https://nvd.nist.gov/vuln/detail/CVE-2017-9226 https://nvd.nist.gov/vuln/detail/CVE-2017-9227 https://nvd.nist.gov/vuln/detail/CVE-2017-9228 https://nvd.nist.gov/vuln/detail/CVE-2017-9229 https://nvd.nist.gov/vuln/detail/CVE-2017-7890 http://php.net/ChangeLog-5.php -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJZZOCBAAoJEJUhvtyr2U3fgywQAKG1HREuG0/k7igaSruNqK/G tiE7H0u6X2jNQlymZQM/kRrKRVogLCGO9sjPjP5DkpolgIsVK/H+upr9xBwdNVQ1 yfKcaHJa5UG3zkCLt2znbCsrKMz1fv0JbXkE0CdpVumlHNE1wuWzYzBm+sphWHjJ sU0dxcvc3U9IthdgBtq55f2RqRsQXg5U6KI9Lht4wIzQzY6Di/OBEY1EYsiPHzGG rL9x6Y9IhCLJDb0htMoEk+HfLfEpAuMTGBADN196diCp4rVb/f6Zt8qA2taO9qCW dgkeqWlfhvgdfu9ZyZZhVoTmofbxKThmJM7WtUYxfzH66Qr27UltDKbHtg64+xyc NnHcOU81TWPcQVwVcygBPtHt/tiap8JgXG3eJ/EpNBTQE3AjCZtTsicrcHqu3ec/ ZZQFqjXGCeepvCLrd5Jajv0ek8rPQbFBPBigr0KFEn3dvxkyGrqGmBap0I8wGIGU tzHZ7Ur30omUZQZS93mc11TVE+X3mfFvDyXmInAN0+c7MuWpkCA4jJvcpcRuDvOc i/Bgsr+i2oLtlH1+gdG+C0mhyTzwyDe9jGX0wa7eQs4pO/MogxilKrz4Xywp6fFC zqe/lGcj7VO5IgqCjqyV0Aexy+MLkSdOmfIWGeFlYi6Rnp5UvdwrPD/WluXavlHM pansC1ubD9Ooc1MaOE9f =7y/r -----END PGP SIGNATURE-----