Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


cPanel - EasyApache 3.30.0 Released
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

cPanel - EasyApache 3.30.0 Released

Just in case you didn't get this.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

SUMMARY
cPanel, Inc. has released EasyApache 3.30.0 with PHP versions 5.4.41, 5.5.25, and 5.6.9. This release addresses vulnerabilities related to CVE-2006-7243. We strongly encourage all PHP 5.4 users to upgrade to version 5.4.41, all PHP 5.5 users to version 5.5.25, and all PHP 5.6 users to upgrade to version 5.6.9.

AFFECTED VERSIONS
All versions of PHP 5.4 through version 5.4.40
All versions of PHP 5.5 through version 5.5.24
All versions of PHP 5.6 through version 5.6.8

SECURITY RATING
The National Vulnerability Database (NIST) has given the following severity ratings to these CVEs:

CVE-2006-7243 - MEDIUM

PHP 5.4.41
Fixed bug in the Core module related to CVE-2006-7243

PHP 5.5.25
Fixed bug in the Core module related to CVE-2006-7243

PHP 5.6.9
Fixed bug in the Core module related to CVE-2006-7243

SOLUTION
cPanel, Inc. has released EasyApache 3.30.0 with updated versions of PHP 5.4.41, PHP 5.5.25, and PHP 5.6.9. Unless you have disabled EasyApache updates, EasyApache updates automatically. Run EasyApache to rebuild your profile with the latest version of PHP.

REFERENCES
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-7243
http://php.net/ChangeLog-5.php
-----BEGIN PGP SIGNATURE-----
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=/dky
-----END PGP SIGNATURE-----

Comments

  • jarjar Patron Provider, Top Host, Veteran

    People give cpanel a lot of crap but they're on top of stuff and proactive about pushing patches. There's a lot to be said for that.

  • @Jar - absolutely these days!

  • @Jar said:
    People give cpanel a lot of crap but they're on top of stuff and proactive about pushing patches. There's a lot to be said for that.

    cPanel has a fantastic product. that has a good track record of staying on top of the exploits. including a solid product that has proven to be reliable.

Sign In or Register to comment.