-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2017-0006 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having CVSSv3 scores ranging from 2.0 to 8.8. Information on cPanel's security ratings is available at https://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: 68.0.15 & Greater 66.0.34 & Greater 64.0.42 & Greater 62.0.35 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION The cPanel Security Team and independent security researchers identified the resolved security issues. There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issues. This Targeted Security Release addresses 23 vulnerabilities in cPanel & WHM software versions 68, 66, 64, and 62. Additional information is scheduled for release on November 21, 2017. For information on cPanel & WHM Versions and the Release Process, read our documentation at: https://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCgAGBQJaEvOdAAoJEJUhvtyr2U3fUJoQAMt0426/beLcNcnFYUuIAO4b Rtwjc7es9HY+EkbuPG/+oyQFbwvl7YXvwMKSmb2mVeo+v1U0a++C4f8CAUSfIX+b iRR3uZzWvtPddS2bFTrR9Jh0MuOjwEe3jIMPTqxuOJJGcHLeBLBvhU988f6QVHbT CJ3eZDQY+lSoUCmJ5mGKOIJ/rzpNumbHIc+pmik/NTv5VeIrm690QOfLL/zk0wKT 5hwkrfrglZF1X38AhY35OqWtJ3qmHQwVYgxAAMBjdj3b5rSAfAEW5a4aoXzElSwa 7RB1AIFLhN7EHrFteaUiZ4y1OGGWLQcklbKJz3QvCJjZ2P7XoVKCcnMjnHEVOKUa PXBp+Ga0/opYqTaTHwjiXXlSvisrcM1/XynfyaOEESWxDIec+S7Qb91QR9XZUU8s OqrHQq3xcdlT6hi+aqZaBCIpybQe4Sy1Lm5c7EX644Mw55HsnXkmVSRpc4vawaIO aSLmZj7s/ZgK8CkxBTuv58S12ZfYdrBWuz/tleVJXfdg7XFZlTGDHuM4b8ZV2+n2 AO9uL7Q1ki4yAE3FnHQTFCrNfKPHzyMXI1Oy5zpZAS37d2K/CelbwLqE8pzpx1Qf KsNm7AIqS7VF51KYG91qpZyBKesi2/jpprS/0sNtUn1NbB1xXc6U9xlbboDrc/qY AAJeIFs87z1l8Rnnwljo =gnyT -----END PGP SIGNATURE-----