-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2016-0004 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having CVSSv2 scores ranging from 1.0 to 6.8. Information on cPanel's security ratings is available at https://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: 11.58.0.4 & Greater 11.56.0.27 & Greater 11.54.0.26 & Greater 11.52.6.2 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION The cPanel security team identified the resolved security issues. There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issues. This Targeted Security Release addresses 7 vulnerabilities in cPanel & WHM software versions 11.58, 11.56, 11.54, and 11.52. Additional information is scheduled for release on July 19, 2016. For information on cPanel & WHM Versions and the Release Process, read our documentation at: https://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCgAGBQJXjQUvAAoJEJUhvtyr2U3fmhQQAJm40Nnjgy1/XkdMRxkFq+X4 hOHXrgHDrr0sOp81W/SeqSLUyfiATUW+AUHX4iYzHZIaOvBMnTkAMk6ODp+1kLS8 8BzMUpHGSSBRjbhhgNgJf7K0dHnvsKiGr6iqu9U0ZDZanQ841Ki5Q9gojkpCXXnj pAHyomtvxHgy3qIBIJXT9+/FR70HsH/mxQyKcpAZicP3X3yBzPshRJvV2V4wdTDO w40nNuNfTLaDkZarXQdtAooNJB2YxjYcNrx39dd9n9AKjULDiAv1/5FiueF/AD1B d4LcMFQOKBdwYACBayk9jKkBO5owH+CN5JJMrj2iSy7zNyVdM16qkSsQsIQ2U1cV KdGw0SJ+h6q7qsjs+WyvFxskCFsEb/p6ZxdE9Dvl8hs4RpPFojqPMVZVttdI6uY6 H+k9vim+3zCtWBveJUnMCpzrrPZagdkGJqQzouuqTRyC8Gb6M8KMjJDJONkrDaAv G/oyZc2CrIFb3KgUs91guCK284n2kn4R7LjVImL2pRRekjp/H8sgfRxU+MJAVrmU x9mse7qawRkz/ayfGtyhihbFeWPeBN51q229k/NBmv7BacgvXGdSWMLmGmkq94Ym vixWP0GiUEt32ZjtpnyWqMjodmH5NwXFHDD6oKn/i0g8BGzuuAWAJlDDN6pHLSAD EvQJwZG48sLkCtAYi2/M =SXEo -----END PGP SIGNATURE-----