-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 TSR-2014-0001 Announcement cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having security impact levels ranging from Minor to Important. Information on cPanel’s security ratings is available at http://go.cpanel.net/securitylevels. If your deployed cPanel & WHM servers are configured to automatically update when new releases are available, then no action is required. Your systems will update automatically. If you have disabled automatic updates, then we strongly encourage you to update your cPanel & WHM installations at your earliest convenience. RELEASES The following cPanel & WHM versions address all known vulnerabilities: * 11.42.0.4 & Greater * 11.40.1.10 & Greater * 11.38.2.16 & Greater The latest public releases of cPanel & WHM for all update tiers are available at http://httpupdate.cpanel.net. SECURITY ISSUE INFORMATION The cPanel security team and independent security researchers identified the resolved security issues. There is no reason to believe that these vulnerabilities have been made known to the public. As such, cPanel will only release limited information about the vulnerabilities at this time. Once sufficient time has passed, allowing cPanel & WHM systems to automatically update to the new versions, cPanel will release additional information about the nature of the security issues. This Targeted Security Release addresses 67 vulnerabilities in cPanel & WHM software versions 11.42, 11.40, and 11.38. Additional information is scheduled for release on February 5th, 2014. For information on cPanel & WHM Versions and the Release Process, read our documentation at: http://go.cpanel.net/versionformat -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBAgAGBQJS79zhAAoJEJUhvtyr2U3fMlgQANJlBj3SATxDh45dUOG1DFYX OI+58czAen9J0jix/GFKAcuFDrG0AwFJnoaRIRg67DSq0VeOr6w1K1OzpbIWtTlc FNwzlbecJSjdhbqnNMTgNqaipC3hdLrHJgwOrPBTVEQubj903nFQ+fsD3f+0bir8 PfTUf1Ia41VCNzp6UKliq/nYrVAk0Icel0qsGjFtd6UP2xc9hxIqOJBW8JzPdsZu QKvG94KKpjE8HazSb+b9c79WzvfmnfIYq7iEVVAvRJG2VjrAhyoPCVX36s0EODyI A+O+iLY02T9gDe/SL779K9W2/451EeJ3jinqZXJSMyru5EwKssvL23U45WTlGAN+ o4oBNc8tGzxYByXmhpcwqkVY+yvNbGZgOt30wgVYw2zE38unmHiDvlBK9YTBjN/5 /RBIXfDDi1IM5mZNUScl06AfbehydUqPsz+oxW2uc7Ldv8nm4QnFXLE5midGt/1j VF4eDxcaiAAtzbGzBcK40WLvxrItqeR+yHqwZC67yIMbd3tqLSnw0rR1npzdyaLG 06jazqLdtBrjIIZJguoeFTSy/BfSB+JjteqGj/sqeXyme4ZjGh0ThipmsiOxqq4B vT6pQg36ebi/IrxS1kIBvlQ6Q4NwqZ8yQH/X3Z+qPC4MqJforZuDYEb7nTyVQJ6B 5ZW45Z+a3eEFF2E1sVcb =Bo8n -----END PGP SIGNATURE-----