Red Hat: 2012:1363-01: bind: Important Advisory
(Oct 12) Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More…]
(Oct 12) Updated bind packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More…]
The Domain Registration Risk Calculator is a tool for domain registrars to
analyse the likelihood that new domains will be used for fraudulent activities. The
service identifies domains which are deceptively similar to legitimate websites run
by banks and other institutions commonly targeted by phishing attacks. Since such registrations are often made using stolen credit cards,
there are significant […]
Plesk Service Team is pleased to announce online Plesk Troubleshooters.
Plesk Troubleshooters help you diagnose and solve technical problems that are occurring with your Plesk server. When you start a troubleshooter, you should provide exact error message from Plesk or system log file related to the problem you are having. This information helps troubleshooter to find solution of problem.
Please share your opinion, experience, recommendations and so on here: http://forum.parallels.com/showthread.php?t=264029
Thank you for your cooperation!
Two weeks after the first beta, WordPress 3.5 Beta 2 is now available for download and testing. This is software still in development, so we don’t recommend that you run it on a production site. Set up a test site to play with the new version. To test WordPress 3.5, try the WordPress Beta Tester plugin (you’ll want “bleeding […]
The following bug has been fixed:
[-] “Default domain” for IP address can’t be changed from one domain to another.
[-] Database copying process hangs after lost connection with MySQL.
[-] Migration fails if site application already exists on destination server.
[-] httpdmng –reconfigure-all fails with error “MySQL server has gone away”.
[-] Not valid XML breaks site application restoring.
[-] There is unable to browse default domain on IP address because of wrong nginx configuration.
[-] vhosts_bootstrap.conf is misconfigured after stop/start nginx service.
[-] Conflict resolving process fails when migration alot of plesk entities with error “MySQL server has gone away”.
(Oct 11) Several security issues were fixed in MoinMoin.
(Oct 11) Updated libvirt packages that fix one security issue and multiple bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
[-] “Default domain” for IP address can’t be changed from one domain to another (104647)
[-] Conflict resolving process fails when migration alot of plesk entities with error “MySQL server has gone away” (112291, 115718)
[-] Not valid XML breaks site application restoring
[-] Migration fails if site application already exists on destination server
(Oct 9) Multiple security issues were fixed in Firefox.
(Oct 10) Bind could be made to crash if it received specially crafted networktraffic.
(Oct 9) Updated firefox packages that fix several security issues and one bug are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical [More…]
(Oct 9) An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical [More…]
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
(Oct 7) Several vulnerabilities were discovered in Icedove, Debian’s version of the Mozilla Thunderbird mail and news client. This includes several instances of use-after-free and buffer overflow [More…]
(Oct 9) Several security issues were fixed in the kernel.
(Oct 9) The system could be made to run actions or potentially programs as anadministrator.
(Oct 9) An updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More…]
(Oct 9) Updated kernel packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 5.6 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More…]
Typographical error leads to XSS vulnerability in language search component.
Joomla! version 3.0.0.
Upgrade to version 3.0.1
Reported by Jeff Channell
The JSST at the Joomla! Security Center.
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
The Joomla Project is pleased to announce the immediate availability of Joomla 3.0.1. This is a security release. This release also fixes several high-priority problems with version 3.0.0.
IMPORTANT NOTE FOR 3.0.0 SITES: If you plan to update a site from 3.0.0 to 3.0.1, you need to install the Joomla 3.0.0 Hot Patch before doing the update to Joomla 3.0.1. See the Hot Patch Instructions for more information. This is NOT required for updating from version 2.5.x. If you require the FTP layer you will need to manually FTP the update. Also, please note that version 3.0 users need to make sure the Update server is set to “Short Term Support” in the Joomla! Update component. Otherwise, no 3.0.x updates will show.
The Production Leadership Team’s goal is to continue to provide regular, frequent updates to the Joomla community. Learn more about Joomla! development at the Developer Site.
Note: Please read the special update instructions before updating. Updating from 3.0.0 requires that you apply the hot patch first.
Want to test drive Joomla? Try the online demo or the Joomla JumpBox. Documentation is available for beginners.
Please note that you should always backup your site before upgrading.
Check the Joomla 3.0.1 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Until now, for both core auto updates and extension updates, update packages have been controlled by the 2-digit version number (e.g., 2.5, 3.0). It is not possible,for example, to have users of version 3.0.0 install a different update package than users of 3.0.1. This means the update packages are larger than they need to be. This feature allows for checking all three elements of a version number.
Thanks to the Joomla Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla, please report it on the Joomla! CMS Issue Tracker.
Active members of the Joomla Bug Squad during the past three months include: Aaron Wood, Andrea Tarr, Bill Richardson, Brian Teeman, Christophe Demko, Dean Clarke, Dennis Hermacki, Elin Waring, Emerson Rocha Luiz, Harald Leithner, Itamar Elharar, Jacob Waisner, James Brice, Janich Rasmussen, Jean-Marie Simonet, Kevin Griffiths, Loyd Headrick, Marijke Stuivenberg, Marius van Rijnsoever, Mark Dexter, Matt Thomas, Michael Babker, Neil McNulty, Nicholas Dionysopoulos, Nick Savov, Nikolai Plath, Ofer Cohen, Peter Wiseman, rachmat wakjaer, Radek Suski, rob clayburn, Roland Dalmulder, Rouven Weßling, Rune Sjøen, Samuel Moffatt, Shaun Maunder, Soheil Novinfard, Troy Hall, Viet Vu.
Bug Squad Leadership: Mark Dexter, Coordinator.
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla secure. Members include: Airton Torres, Alan Langford, Bill Richardson, Elin Waring, Gary Brooks, Jason Kendall, Jean-Marie Simonet, Jeremy Wilken, Marijke Stuivenberg, Mark Dexter, Michael Babker, Rouven Weßling, Samuel Moffatt.
The great news is you don’t have to be a developer to help build Joomla. The Joomla Bug Squad is one of the most active teams in the Joomla development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla Wiki and, if you wish to join, email the Bug Squad coordinator.
You can also help Joomla development by thanking those involved in the many areas of the process.
The Joomla Project is pleased to announce the immediate availability of Joomla 3.0.3. This is a security release. The Production Leadership Team’s goal is to continue to provide regular, frequent updates to the Joomla community. Learn more about Joomla! development at the Developer Site.
Note: If you are running version 3.0.0 please read the special update instructions before updating.
Want to test drive Joomla? Try the online demo or the Joomla JumpBox. Documentation is available for beginners.
Please note that you should always backup your site before upgrading.
Check the Joomla 3.0.3 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Thanks to the Joomla Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla, please report it on the Joomla! CMS Issue Tracker.
Active members of the Joomla Bug Squad during the past three months include: Aaron Schmitz, Akarawuth Tamrareang, Aleksander Linkov, Andrea Tarr, Andrew Eddie, Angelika Reisiger, Brian Teeman, Constantin Romankiewicz, Cristina Solana, Daria Mikhailova, Dennis Hermacki, Elin Waring, Harald Leithner, Jacob Waisner, James Brice, Jan Kuchař, Janich Rasmussen, Jean-Marie Simonet, Jonathan M. Cameron, Kevin Griffiths, Lukas Polak, Mark Dexter, Mark Lee, Michael Babker, Milton Bryant, Moises Jafet Cornelio-Vargas, Nicholas Antimisiaris, Nicholas K. Dionysopoulos, Nick Savov, Nikolai Plath, Ofer Cohen, Omar Ramos, Peter van Westen, Peter Wiseman, Rob Clayburn, Roberto Segura, Roland Dalmulder, Soheil Novinfard, Tessa Mero, Troy Thomas Hall, Viet Hoang Vu.
Bug Squad Leadership: Mark Dexter, Coordinator. Super-star contributors and leaders by example: Jean-Marie Simonet and Elin Waring.
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla secure. Members include: Airton Torres, Alan Langford, Bill Richardson, Elin Waring, Gary Brooks, Jason Kendall, Jean-Marie Simonet, Jeremy Wilken, Marijke Stuivenberg, Mark Boos, Mark Dexter, Michael Babker, Pushapraj Sharma, Rouven Weßling.
The great news is you don’t have to be a developer to help build Joomla. The Joomla Bug Squad is one of the most active teams in the Joomla development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla Wiki and, if you wish to join, email the Bug Squad coordinator.
You can also help Joomla development by thanking those involved in the many areas of the process.
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
[-] Parallels Premium Outbound Antispam license could not be applied due to wrong product name
[-] Russian locale has been updated
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
[-] Parallels Autoinstaller has been updated to version 3.12.0
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
(Oct 8) It was discovered that bacula, a network backup service, does not properly enforce console ACLs. This could allow information about resources to be dumped by an otherwise-restricted client. [More…]
(Oct 8) Timo Warns discovered that the internal authentication server of hostapd, a user space IEEE 802.11 AP and IEEE 802.1X/WPA/WPA2/EAP Authenticator, is vulnerable to a buffer overflow when processing fragmented EAP-TLS messages. As a result, an internal overflow checking routine terminates [More…]
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
[-] Parallels Premium Outbound Antispam license could not be applied due to wrong product name
[-] Russian locale has been updated
Method of encoding search terms led to possible information disclosure.
Joomla! version 3.0.2 and earlier 3.0.x versions; version 2.5.8 and earlier 2.5.x versions.
Upgrade to version 3.0.3 or 2.5.9.
Reported by Egidio Romano
The JSST at the Joomla! Security Center.
Coding errors led to information disclosure in some situations.
Joomla! version 3.0.2 and earlier 3.0.x versions.
Upgrade to version 3.0.3.
Reported by Stergios Kolios
The JSST at the Joomla! Security Center.
58 queries. 9 mb Memory usage. 1.344 seconds.