-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 cPanel TSR-2021-0004 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated this update as having a CVSSv2.3 score of 3.1. Information on cPanel's security ratings is available at https://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: 94.0.13 & Greater 96.0.12 & Greater 98.0.1 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION There is no reason to believe that this vulnerability has been made known to the public. As such, cPanel will only release limited information about the vulnerability at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issue. This Targeted Security Release addresses two vulnerabilities in cPanel & WHM software versions 94, 96, and 98, with an additional three vulnerabilities in version 96. Additional information is scheduled for release on July 20th, 2021. For information on cPanel & WHM Versions and the Release Process, read our documentation at: https://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- iQJIBAEBCgAyFiEEtnCbTMb0IHf2mEGRlSG+3KvZTd8FAmDwOyIUHHNlY3VyaXR5 QGNwYW5lbC5uZXQACgkQlSG+3KvZTd93IhAAidFSY/mfGZX0M0IjV5SY2ooVXPMH H7+Py9A3/4Nbcu8RI04D1pvBcFW6/hA99oHHjYCnU5kCCoNRJOiddWG0dV2DT3Du IRDZ/LNMwmZGQA8pFkT2UmnuW/4Gf+uqnd5gDyUXMiKkR89X4pbrcYtYK9cS8/7O wnZlp0zfUgwhX5wJOuwYSrXX4O1RINDi2QkG9wcp6Xk/gtiUnTm3PUm+U8rJ1apZ k55ywqAObfORoLxuuI3TR+7ETG3KfxdchRilJBfqFvN9bapf7WtlEWyhOFiBbYdC WcIreLNLC2BPzFI31XcNaRe3w0UqWlPYpxKi0PQ8/Z64C2TK3Do9xVK96HMCY75w ZlCCmP2PI7qhxYuwtHzmRjMXTLNRmj0woLUpTTzAhDqt45U+QtVTHlcK6r+SA2r+ LeLOdPG6xGNS8FnTZFglOp5zfEK0quIhlzzZwilLDjZ+WCEQgi9pp28Wcw+gs2Z6 2cVUwQBAxdtslIS35eSLa0Ca/Hos50j2oyW3xxRYAn7G6xct6ip9QF76Ql28xbvZ j8N5+P1zRg9TzvG01KfB1HsAuOvJWIlgnNw7Qeo3HHHNYAx77hXwVjQC2Os7uO3x L9eS/0QPvm2uZZmCJIpL0+t49IHm3UU8GDCWXlgtr1JI+SAjLUyTU2jBi559WM4E Lc4BrIR2zaO9jpo= =kRNy -----END PGP SIGNATURE-----