-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2014-0004 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having security impact levels ranging from Minor to Important. Information on cPanel’s security ratings is available at http://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: * 11.43.0.12 & Greater * 11.42.1.16 & Greater * 11.40.1.14 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION The cPanel security team and independent security researchers identified the resolved security issues. There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issues. This Targeted Security Release addresses 52 vulnerabilities in cPanel & WHM software versions 11.44, 11.42, and 11.40. Additional information is scheduled for release on May 26th, 2014. For information on cPanel & WHM Versions and the Release Process, read our documentation at: http://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJTemdJAAoJEJUhvtyr2U3f/DAP/0W6k+IsUNji2UD30BmNgnzs OO3kjUP9Ub4VqtmO85G/Q5235DeRVH1FMAaIok2AFoBnfROTb5rKReDPeD3I+YuY CPR8ZJxtpqYzDIp0InVaHDeotP1XQBrOo8XENZvz+HXCTcOeNpNo2JSANWqTWWr0 MjMFsM0QzAjRzNGUjh6RR63KllY5Epwhn9b9MFo3y9br3tXnrfnYLbqCxRDgXa2z PGveOkpM1fFpmXJ1Fn/wG36qdFoG87VOGc6bvnL4UyqIKLF59hiyONgBp7itqShk okMC06Iduq6VBMgttDa7ggVhX6ifJ5rVBuNNXcGAs3Yhe/FTxxb2bojgL3tDUCeq NzNDZNcjyZXPqT99F17xK0JiL3uy89azCtp99KsE+Y6EkjkZtSK0WU/lpn5Wb9/d gVnH+fQvtsyAXKtVkpR9gumlBF4SPVvTebFhMqQsFVlsjYZ2/YysAu0WpVroC7vk MZLSriFz33l9Ve/CS6GUqoGmaEHicm9qVYTRLrQ/EKkKI6qEwY/HABUQP+b/YQOH l+/Yu0rkXbrbMdeTuzrO0nk8cf0miwhvc7C7ahUdBdU7Mqn4VfN8EPsuUHjqq2PE Fih+vtHEX3j+nz+I3wn3u6QLBnxsZApT0mZscRoLh7XFclA5ENM0AyVw+qPttfoV c2c4qbAGVVGTy5MNSnot =xGWU -----END PGP SIGNATURE-----