-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2021-0003 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated this update as having a CVSSv3.1 score of 3.3. Information on cPanel's security ratings is available at https://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: 96.0.8 & Greater 94.0.10 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION There is no reason to believe that this vulnerability has been made known to the public. As such, cPanel will only release limited information about the vulnerability at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issue. This Targeted Security Release addresses one vulnerability in cPanel & WHM software versions 96 and 94. Additional information is scheduled for release on May 18th, 2021. For information on cPanel & WHM Versions and the Release Process, read our documentation at: https://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- iQJIBAEBCgAyFiEEtnCbTMb0IHf2mEGRlSG+3KvZTd8FAmCiy20UHHNlY3VyaXR5 QGNwYW5lbC5uZXQACgkQlSG+3KvZTd9u2Q/9F1tBFpTEKyogapm6MP0ubuqCnire 7o+P14iLdnQ4UsXF9zJmPlSRyyhu46whclGROed4uWuQ5cLmLRbZdzXv+CithFhR kEClHjeQjPzoT7bbIp85NjkbvwTublL7lbpapYJQFBHsYvzHitWkdZK7JBqNhKc2 J+XKTekg372A2l662LGtDtCzL7zZJAfcFVE0MgIWGHXn07UpevzebD7unFkI3/b/ 9QKi7fLE3K87B5vG+Ufqw9/qDDKKR80L3XHRys6gXcuJQcsmXeKq4ZUa2DC7Yyeq oGfUrSzx2tzLRZBqFPaqSeHysEriK8eCQuLaLAINDYGznG20qxn1tWcZgiHIdo7D TOvC9bcyniyGy1tlnakcM5dggbwcvgub4zFUHe9DNVEj4VXRkfNZzBjhUUlD4QN2 zAomNhVKxxozfdjW5xF8KGgWYq3qKIBpaAsG0TZoHtgdkWChsGGvE7uCZSEbltVw GmU90/qlLqY+ozeiaQLCrxeooGBLKtda46CyYwNVS/x8qSOilHJjQG7nrXnv7N89 mA0pO+NLxZlFwxvZZlcoAfZeDj1IInzG+lZq+PKeVksaoMsp4IbaqNKtRmRbxErQ EXnPQbohxIfke5gTfHgQonCpVlLp7JLZXqZZkk8TNYbmM48/UtDovfs9qkkCAU6y nlqsePCt+ESlSKM= =CbJj -----END PGP SIGNATURE-----