-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 cPanel TSR-2022-0005 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated this update as having a CVSSv3.1 scores from 3.3 to 9.0. Information on cPanel's security ratings is available at https://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: 102.0.25 & Greater 106.0.10 & Greater 11.108.0.3 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issue. This Targeted Security Release addresses two vulnerabilities in cPanel & WHM software versions 102, 106, and 108. Additional information is scheduled for release the following day. For information on cPanel & WHM Versions and the Release Process, read our documentation at: https://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- iQJIBAEBCAAyFiEEtnCbTMb0IHf2mEGRlSG+3KvZTd8FAmNydV8UHHNlY3VyaXR5 QGNwYW5lbC5uZXQACgkQlSG+3KvZTd8HaRAAkYcTmSUlPU8jBTT+5l9qlbJWQT0Q EvEeIS07awD5ffwwdxZWLIk8dsK9yinR1E1Dd1To1l+KVWJN4s9I03jVeK/llWGX 3aPzeJu8qmN/CJMXVkB0K6hT9S7L7fW4PLSxV7jSoD5p68VQtheOObvao/+14xnI hJ0bRCGdToqgkkIgmQI+sUyn9Dv7zVinDcSZqlTTATmyx4+L8XI8355BGvRaTP5+ 7rjAyM1EIRM6FIEMgoGqGWaWTk9Wr9AzItAoE6vNTwD84EwFtLhIuYrvkfGrNCaX 9nD77dhzkn/fE4mk141r4z5O6BIdqcyGfgsiXX2oFEz4VkeaU10ZElO0IlxBiPx7 sPOC03q9aAdd9d0016AUwwRGnF8s1yi1R9BLa+X5egH0Qd1QIS3vFIXHLSkmX/eT imZteKIJTwvSTaSFphriNgHVt15sy5Y0smKXYooCOUDQor1gsw5Z3wKHkl4iVrAj 9r3iBbcp8Z1TsHtTSoTXLVeIIJThHG5wiLnDCfa044IGxF0v8/3PwBXoRCwvLFon u9A+dJVaaI49VL53Yf+3tVOsJL0UwiB94ZDjdxHG2W8D3WrgID1cumvq2jj8bYXl DymSUNSK9tmWxR4Gt83xv+zwSkKrhbkiPCaFxZ+/qWhP6nqRz2gAYkXTdWuTkDAp m45poAW9tTOuSMI= =fpXo -----END PGP SIGNATURE-----