-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2016-0002 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having CVSSv2 scores ranging from 2.1 to 8.5. Information on cPanel's security ratings is available at https://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: 11.54.0.20 & Greater 11.52.4.1 & Greater 11.50.5.2 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION The cPanel security team identified the resolved security issues. There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issues. This Targeted Security Release addresses 17 vulnerabilities in cPanel & WHM software versions 11.54, 11.52, and 11.50. Additional information is scheduled for release on March 22, 2016. For information on cPanel & WHM Versions and the Release Process, read our documentation at: https://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.18 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBCgAGBQJW8CXUAAoJEJUhvtyr2U3fdeUQALiUzkyDRlc+4pq1ayzQTfl5 MJER/uW6mj1PVPHoMEDqQGgoxAXRdwnLSpFuj+QQEYDDLYhq5baVPz3Ak9Y0XULH TSXYX9kiCo27KUFFC+5EhUyBWLoAnD1XEn9VH4ffJadWdniGZld9wRc6JsfFKnkI jjrRFz0QT7oBwj6neflCeWSn4vkzEyvmGwjhr/D5Lj7vPAu8SOYE8fdVRPDm8/FD MrF6q9LTAOLzkHkd5CX4m9Rqldiz1rHGA9Srt40ts3B6GekCRJQ+C1HlLptbMtNF +h///ERfV/PczQiqT5R4zGu30BzwLRnr+RgEGzNmazYofyAzmOI+qJhjnJWqKuK3 aR7XIx5iUvffMVG9OZkyPkIUvyf1DyBnNisSwmhbsJeJXUkJHh3UqNRlKlmmZh17 nPXaVYWs9QHAJNDFmUTBVu9MV7gW+UHCD9ri6AaaWJM793LaahmOpclyCsnaQUsD cpz2iNP2oggohl6TP8X+0zWPkRXMjslMs7MydamXdFwSEtkul/fSrEGRUk03+11d lEN9b4TKWPBsL8NLeMbp06XvKH1ohlY4aF+Wul4hNe6210xGzPtContG4IZFHHKE IjqE2aoVYXdRDfeXbVadjME7YEL4Q0PzHAurChPAOpd6M3nZAw4GV85ybHkKbM9l 55KE+/qUDky3CfeqL2Pz =MgXj -----END PGP SIGNATURE-----