-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2014-0002 Announcement cPanel has released a new build for the 11.42, CURRENT, and EDGE update tiers. This update provides targeted changes to address security concerns with the 11.42 release of the cPanel & WHM product. This build is currently available to all customers via the standard update system. cPanel has rated this update as having a security impact level of Important. Information on cPanel’s security ratings is available at http://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: * 11.42.0.6 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION Independent security researchers identified the security issue resolved in this update. There is no reason to believe that this vulnerability is known to the public. As such, cPanel will only release limited information about the vulnerability at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new version, cPanel will release additional information about the nature of this security issue. Additional information is scheduled for release on February 14th, 2014. For information on cPanel & WHM Versions and the Release Process, read our documentation at: http://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBCgAGBQJS+9EnAAoJEJUhvtyr2U3fSdkP/10YCc98x7ltW1QxNH0ILmKM tsDKi4qyPreCJ2TUyZaMAREFAGX6PF/ZorpVwS4Lf6lLs/5K3FLmKSquBi3Xgg/H 8jmb4XaWCd2JPnuvLk8zf8PGQGWbPW8m6fZiN8X5uRON1jqBusUBtloewVeoARHM kA7X9H9TIP0AeDiuIewYpRMpJlHQTPb/o4pxd3HQTOnA5ET6PAK0e5pw5vyJniR4 1oohDmnXQy1nB7gQ4sIR0TbB2pJncUZRudk+vvrld5N0toWJzGRdtmk+8bttOs21 Yxc3mDyR0S/WEIa7l0d2WHRV04FWT4fEUuHzagtkMReTOV/+AEYaS1NEre+GHBNI Kc99U9KsP17LCsbeII3CbV5+FuTIzPw3Y8YnSDKVy7Wpg3pVGDMsVBCD7sLFFzzh fbfFa59rFvDxInbpQDgwm3sph1gYKEXo8q0yAv/A4VxTnN+Z+PViwT1o3xlfg2iz /o9OiguAA1/ZZ1NIZWdP201ka1IvYL+zH+mfdy4ktI7wvCZgr2K4GBjg06CQwTmB eF/CzRqWLoKXqud6BJYnZOEOZdWSSsJ+LjZM4QZ6B3QMv+afuZfXgbOx2Q4MnW+A 0PcIXzAYxQxa7g/YjO/7VgTAa4zHrWZEaTChWj1dNDkKnExKtiYiYfNYmcqnyoN8 lrFt5jRJgGFD16yFTuK5 =FhBl -----END PGP SIGNATURE-----