-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2014-0007 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having security impact levels ranging from Minor to Important. Information on cPanel’s security ratings is available at http://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: * 11.44.1.18 & Greater * 11.42.1.26 & Greater * 11.40.1.21 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION The cPanel security team and independent security researchers identified the resolved security issues. There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issues. This Targeted Security Release addresses 13 vulnerabilities in cPanel & WHM software versions 11.44, 11.42, and 11.40. Additional information is scheduled for release on September 15th, 2014. For information on cPanel & WHM Versions and the Release Process, read our documentation at: http://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJUDgNtAAoJEJUhvtyr2U3ffHUQAKMyeoqGB6ttxRjMn8TOqU6+ r8X/Y6geynxCn9kWpfymNWPSQKubX6KbZJKXIXhtnnYSK57zbz9klCYLSvNlqrmE fhHF94n/N9VAYiW1EWXmZo+JUA1NGV9iyt/gVIG4YcnHsgy/4oUVioTJUVxJbaN9 odfkWb5t0DH0stpc647XVxRjqwQBEa9N3yoJ+p5swkNjGQp1vSVRc9l2eegBxPSX v2tmhEh+3WdxSJU1FfxBM5/U7h+Krfj7RRWxYxlJoNhRbR99uZGSpR6qi73gY5EH shlB8wRWpINN8KIfFDbXa0KEXf04k+FLzpTjf3yKGciV52ryK5um9VpDk/utSF3w AGSa2KkR6684fLeG/YKkldIImXkV2jYF7OgeXEjfwtxtqFp+CrT88wyn+7F9+GaJ R5T5u00HDwwHNVo4XcGP3yBKroCzBGKZQwqIdtWgiiT79LSwru8NEvs/d7t/LVR4 y26uskugci9O7XgcPgSVbtJ0kGIwUgM9dAUQu05xGJ851pgATJw0Gi+0wh2cpt33 y/VRrkh8dTH7lINQBVNdm4hO4Fs67YFKbo96gJDkFbMZ447nlgWwJB6w75ktODuo /xHdx5lab8IP4tEzL/Rb4EaVyzqPU2MgdqMU0e+MvM//J6Y/+/MBMU9aqXqKQuIT jGrMx+DpwBm1ftkDWgey =oYT5 -----END PGP SIGNATURE-----