cPanel has released new builds for all public update tiers. These
updates provide targeted changes to address security concerns with
the cPanel & WHM product. These builds are currently available to all
customers via the standard update system.
cPanel has rated these updates as having security impact levels ranging
from Minor to Important.
Information on cPanel’s security ratings is available at
http://go.cpanel.net/securitylevels.
If your deployed cPanel & WHM servers are configured to automatically
update when new releases are available, then no action is required.
Your systems will update automatically. If you have disabled automatic
updates, then we strongly encourage you to update your cPanel & WHM
installations at your earliest convenience.
Releases
The following cPanel & WHM versions address all known vulnerabilities:
* 11.39.0.5 & Greater
* 11.38.1.13 & Greater
* 11.36.1.15 & Greater
* 11.34.1.25 & Greater
* 11.32.6.17 & Greater
The latest public releases of cPanel & WHM for all update tiers are
available at http://httpupdate.cpanel.net.
Security Issue Information
The cPanel security team and independent security researchers
identified the resolved security issues. There is no reason to believe
that these vulnerabilities have been made known to the public. As such,
cPanel will only release limited information about the vulnerabilities
at this time.
Once sufficient time has passed, allowing cPanel & WHM systems to
automatically update to the new versions, cPanel will release
additional information about the nature of the security issues. This
Targeted Security Release addresses 5 vulnerabilities in cPanel & WHM
software versions 11.39, 11.38, 11.36, 11.34, and 11.32.
Additional information is scheduled for release on July 17th, 2013.
For information about our Versions and Release Process, read the
following document:
http://go.cpanel.net/versionformat
For the PGP signed version, go here
(Jul 15) Several security issues were fixed in libxml2.
Ubuntu: 1903-1: Apache HTTP Server vulnerabilities
(Jul 15) Several security issues were fixed in the Apache HTTP Server.
The first release candidate for WordPress 3.6 is now available.
We hope to ship WordPress 3.6 in a couple weeks. But to do that, we really need your help! If you haven’t tested 3.6 yet, there’s no time like the present. (But please: not on a live production site, unless you’re feeling especially adventurous.)
Think you’ve found a bug? Please post to the Alpha/Beta area in the support forums. If any known issues come up, you’ll be able to find them here. Developers, please test your plugins and themes, so that if there is a compatibility issue, we can sort it out before the final release.
To test WordPress 3.6, try the WordPress Beta Tester plugin (you’ll want “bleeding edge nightlies”). Or you can download the release candidate here (zip).
As you may have heard, we backed the Post Format UI feature out of the release. On the other hand, our slick new revisions browser had some extra time to develop. You should see it with 200+ revisions loaded — scrubbing back and forth at lightning speed is a thing of beauty.
Delayed, but still loved
The release will be out soon
Test it, por favor