-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2014-0006 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having security impact levels of Moderate. Information on cPanel’s security ratings is available at http://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: * 11.44.1.11 & Greater * 11.42.1.25 & Greater * 11.40.1.20 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION The cPanel security team identified the resolved security issue. There is no reason to believe that this vulnerability is known to the public. As such, cPanel will only release limited information about the vulnerability at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new version, cPanel will release additional information about the nature of this security issue. Additional information is scheduled for release on August 11th, 2014. For information on cPanel & WHM Versions and the Release Process, read our documentation at: http://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJT4ASHAAoJEJUhvtyr2U3fyn8P/iAt6HHJH12Y0jvwTSGL2b8D 0CVsrVEP/r1q5Gk1xnYapeg0NZTqmKxQnvygjv1jYmdMnMx4Y2NI3lUNVjrRo8v5 dH0qrFwPA6tIoNoAySDC+M5c+PYeVx0UY64ynWSnxiUNd6ng1VeniT/8FL6G/8BD i6+MI4B4g6+2VMO0ztkCXqoV+9psvBn1jlBmQqHbqXdtBqN6oGSiX3YjWFolI9+9 UAweR+Sgc6j9TuqPKNqvlR8b+xYgaCELYWjOHPQ2r8sQlV59DfV/CvbvTMf7mtFD 0qrCgAZX4GOMKHHGbXCT4/8gkbNa+efQNGsucZ1Rf6DEXYqAgzld+waslsjYtGlH 4CgyuVzaFgGhXgEO14EFMxO4P78W74OmT+QjGDgkKMQ+V8ZsANOwSy9/uixZlG1e SPJbJV7ZcjWF5Woo3AXKUR3fc0H4HsH2aHvliNa8ZtwQu+bRyDigh0DCv5DP61AZ P8uN7xhZVZxQkeNDDkm58vIbrXpSXsCD2byJrzBaW42OLgftG90aR9IrQXR5f1+c mJET5KCmltJJnCehQ1AhrKOb8uvPZLnoSDoufWXGPmsnwOao5WRq6DIMh/KwLf9R hokvdLlNXt578DS2+ZfXMwpcXS76upbNq0cFTG2mwU7n0GXHrl+noNaq+7IdJblO lxLV1stOJ6oJRVT/fnr+ =sBw6 -----END PGP SIGNATURE-----