The following bug has been fixed:
[-] Fixed moderate security issue with privilege escalation. Parallels Plesk Panel versions 9.x-11.x with Apache web server running mod_php, mod_perl, mod_python, etc. is vulnerable to authenticated user privilege escalation. Authenticated users are users that have login to Parallels Plesk Panel (such as f.e. your customers, resellers, or your employees).
Parallels Plesk Panel instances with Apache web server configured with Fast CGI (PHP, perl, python, etc) or CGI (PHP, perl, python, etc) are NOT vulnerable.
More details in article Public issues VU#310500 and CVE-2013-0132, CVE-2013-0133
This MU is recommended for all Parallels Plesk Panel users.
Archive for April, 2013
Ubuntu: 1792-1: Linux kernel vulnerabilities
(Apr 8) Several security issues were fixed in the kernel.
Ubuntu: 1793-1: Linux kernel vulnerabilities
(Apr 8) Several security issues were fixed in the kernel.
Red Hat: 2013:0737-01: subversion: Moderate Advisory
(Apr 11) Updated subversion packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
The Joomla! Project is pleased to announce the availability of Joomla! CMS 3 Beta4. Community members are asked to download and install the package in order to provide quality assurance for Joomla 3.1. Joomla 3.1 is scheduled for release on April 15th, 2013.
Joomla 3 is the latest major release of the Joomla CMS, with Joomla 3.1 the second short term support release in this series. Please note that going from Joomla 3.0 to 3.1 is a one-click upgrade and is NOT a migration. The same is true is for any subsequent versions in the Joomla 3 series. That being said, please do not upgrade any of your production sites to the beta version as beta is ONLY intended for testing.
What is this release for?
This is a beta release and not for use on production sites.
Extension developers are encouraged to work with this release in order to prepare extensions for the General Availability release of Joomla 3.1, though there shouldn’t be any backward compatibility issues. Users are encouraged to test the package for issues and to report issues in the Joomla! issue tracker.
What are the new features of Joomla! 3.1?
- 29855 – Tags (click here to see the recent blog post about it)
- 29822 – Show logs in debug console
- 30085 – Refactor installation to use new application and MVC classes
- 29965 – Added pagination in COM_SEARCH component
- 29770 – Added triggers on save for com_config
- 30230 – JPlugin autoloadLanguage property
- 28924 – Added SQL Server subclass for FinderIndexer
- 30318 – Media wiki package
- 30369 – OpenStreetMap package
- 30364 – UNION ALL feature
Miscellaneous: 28574 – Removed the GeSHi plug-in
What are the other new features of the Joomla! 3 series?
- Incorporation of Twitter Bootstrap into a jui media package.
- A new responsive administrator template–Isis– and interface.
- A new front end template–Protostar– built using Twitter Bootstrap
- Updated accessible template called Beez3
- PostgreSQL Driver. You will be able to run Joomla 3.0 sites using the PostgreSQL database.
- PHP Memcached Driver
- Use of JFeed for feed management rather than SimplePie
- Installation of language packages directly from the extension manager
- Guest user group present by default
- Saving blank articles allowed
- New administrator statistics module
- Update TinyMCE to version 3.5.6
- Continued clean up of older unused code, files and database fields and tables and improved standardization of tables.
- Improvements to Smart Search
- Extensive work on code style standardisation and consistency
- Unit testing in the CMS
- Updated system tests in the CMS
- Multilanguage: adding items associations in remaining core components.
- Language Installation tool for the Joomla Installer.
- Items associations in multi-language
- Allow different update packages for different version dev levels
What is the status of Joomla! 2.5?
Version 2.5 of the Joomla! CMS is a Long Term Support release and support for it will continue until shortly after the release of Joomla 3.5 scheduled for Spring 2014. Joomla 2.5 users do not need to migrate to Joomla 3.0 or 3.1.
Will I be able to update directly to Joomla! 3?
Moving to Joomla 3.x from Joomla 2.5 will be a mini-migration not an upgrade, although for the core of Joomla! the migration should be simple. However, it is likely that templates for Joomla 2.5 will need modification to work with Joomla 3 as will many extensions. Always test prior to migrating and consult with the developers of any extensions and templates you use.
What is the status of Joomla! 1.5?
Support for Joomla 1.5 ended in April of 2012 and we continued to support it unofficially until the end of 2012 for medium to high priority security issues.
Does that mean your 1.5 site will suddenly stop working? No, your site will continue to work as it always has. However, Joomla’s developers will not be releasing new versions for Joomla 1.5, so you won’t be getting bug fixes or security fixes. For this reason, it’s recommended to migrate from 1.5.
Moving from 2.5 to any Joomla 3 version is relatively simple, since Joomla has made the process easy for newer versions. Unfortunately, moving from 1.5 is not a trivial task. Fortunately, there are two good extensions that make the process easier: jUpgrade and SPUpgrade.
You have a choice of going straight to Joomla 3.0 or going to 2.5 first. Both jUpgrade and SPUpgrade have versions ready for both versions. Please consult with their documentation on how to migrate from Joomla 1.5 to 3.0/2.5.
For most new/migrated sites, the Joomla! 3 series is the preferred series and starting on it avoids a mini-migration from Joomla 2.5 later down the road. Starting on the Joomla 3 series for a new/migrated site, also provides you with longer backward compatible support (with one-click upgrades) than starting a new site on 2.5 right now, because support for 3.x ends in 2016.
How can you help Joomla development?
There are a variety of ways in which you can get actively involved with Joomla! It doesn’t matter if you are a coder, an integrator, or merely a user of Joomla!. You can contact the Joomla! Community Development Manager, David Hurley, [email protected], to get more information, or if you are ready you can jump right into the Joomla! Bug Squad.
The Joomla Bug Squad is one of the most active teams in the Joomla development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla Wiki and, if you wish to join, email Mark Dexter, one of the Bug Squad co-coordinators.
You can also help Joomla development by thanking those involved in the many areas of the process. The project also wants to thank all of the people who have taken the time to prepare and submit work to be included in Joomla 1.6,1.7, 2.5, & 3.1, and to those who have worked very hard on the Joomla Platform separation project.
Related information
If you are an extension developer, please make sure you subscribe to the general developer mailing list as this is a place where you can discuss extension development and news that may affect custom development will be posted from time to time.
Following is a list of previous news and information about Joomla and other sites of interest:
- Working with the Joomla Feature Tracker
- General developer mailing list
- Joomla developer network
- Joomla development strategy
A Huge Thank You to Our Volunteers!
This beta release is the result of thousands of hours of work by dozens of volunteers. Thank you so very much for making Joomla the best CMS on the planet!
Angry Birds impersonated to distribute malware
As part of Netcraft’s ongoing work in providing anti-fraud and anti-phishing services, we have recently discovered a significant number of Russian language attacks targeting users of popular pieces of software, including well known brands such as Angry Birds. This type of attack can be particularly successful as it exploits a user’s trust in a brand. […]
Debian: 2659-1: libapache-mod-security: XML external entity process
(Apr 10) Timur Yunusov and Alexey Osipov from Positive Technologies discovered that the XML files parser of ModSecurity, an Apache module whose purpose is to tighten the Web application security, is vulnerable to XML external entities attacks. A specially-crafted XML file provided by a [More…]
Ubuntu: 1794-1: Linux kernel (OMAP4) vulnerabilities
(Apr 8) Several security issues were fixed in the kernel.
Ubuntu: 1799-1: NVIDIA graphics drivers vulnerability
(Apr 10) NVIDIA graphics drivers could be made to run programs as an administrator.
Red Hat: 2013:0728-01: rubygem packages: Moderate Advisory
(Apr 9) This update fixes one security issue in multiple rubygem packages for Red Hat OpenShift Enterprise 1.1.3. The Red Hat Security Response Team has rated this update as having moderate [More…]
Red Hat: 2013:0727-01: kvm: Important Advisory
(Apr 9) Updated kvm packages that fix three security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having [More…]
Mt.Gox “victim of own success” as Bitcoins fall in value
After days of intense growth, Bitcoins peaked at an unprecedented value of $266 last night, shortly before a crash which saw some investors selling them for as little as $105.
What’s on May 27, you ask? May 27, 2013 is the 10th anniversary of the first WordPress release! We think this is worth celebrating, and we want WordPress fans all over the world to celebrate with us by throwing their own parties. We’re using Meetup Everywhere to coordinate, and will be putting up a website […]
Plesk Service Team is pleased to introduce the Plesk FAQ.
We collected a lot of questions and answers concerning various aspects of Plesk in the corresponding KB article.
We will continue to fill Plesk FAQ with new and valuable information.
Ubuntu: 1795-1: Linux kernel (Quantal HWE) vulnerabilities
(Apr 8) Several security issues were fixed in the kernel.
Ubuntu: 1796-1: Linux kernel vulnerabilities
(Apr 8) Several security issues were fixed in the kernel.
Red Hat: 2013:0729-01: haproxy: Moderate Advisory
(Apr 9) An updated haproxy package that fixes one security issue is now available for Red Hat OpenShift Enterprise 1.1.3. The Red Hat Security Response Team has rated this update as having moderate [More…]
Red Hat: 2013:0730-01: flash-plugin: Critical Advisory
(Apr 10) An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More…]
J and Beyond, an International Joomla! Conference, is back for a fourth year.
From May 31st to June 2nd, Joomla! developers and site builders from over 30 countries will gather in Noordwijkerhout, near Amsterdam.
J and Beyond is one of two big international Joomla conferences every year, with the Joomla World Conference being the other.
Why Come to J and Beyond?
Come to J and Beyond for all these reasons and more:
- Learn from others
- Share your ideas
- Plan for the future
- Meet the people behind the avatar
- AND most importantly – to have fun!
Keynote Speakers Announced
The J and Beyond team are excited to have such a great and varied lineup of Keynote speakers including Pierre Joye from php.net who has made over 6000 commits to php.net.
It’s not just about the code – it’s about the relationships that are made. Chiara Aliotta will be speaking about the relationship between the designer and the developer and Xavier Dutoit will be there to build bridges between the Joomla and CiviCRM communities.
David Hurley (community development manager) and Andy Tarr (PLT) will be speaking on what have we accomplished in the past few years? Where are we in the current state of the web? Where are we going?
Finally there are two wildcards. Rod Martin and Peter van Westen will be bringing their unique, thought provoking and truly entertaining presentation styles with “Life Is Short And So Am I” and “What Nothing – Regular Expressions and other confusing s(?:tu|h[1i])([f]{2}|t)$”
Click here to find out more about our keynote speakers.
2013 Location
Noordwijkerhout, is very conveniently located. The venue is near Amsterdam and is only 25km away from the Netherlands largest airport, Schiphol
Free Beer!
Well almost. The early bird ticket sales end at the end of April and with the money you save you can buy more beer (or soda).
Click here to buy tickets now.
Do you have something to say or share?
You can only win a speaker slot if you enter the competition. If you were waiting for an invitation to speak: THIS IS YOUR INVITATION. Submit your session proposal today. The deadline is the 15th April (no exceptions).
This year we are offering three different session lengths:
- Show and Tell (5 to 10 minutes)
- Regular (1 hour)
- Super-sized (2 hours)
We want you to present.
Ubuntu: 1797-1: Linux kernel (OMAP4) vulnerabilities
(Apr 8) Several security issues were fixed in the kernel.
Ubuntu: 1798-1: Linux kernel (EC2) vulnerabilities
(Apr 8) Several security issues were fixed in the kernel.
Ubuntu: 1791-1: Thunderbird vulnerabilities
(Apr 8) Several security issues were fixed in Thunderbird.
Red Hat: 2013:0714-01: stunnel: Moderate Advisory
(Apr 8) An updated stunnel package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
The following new features have been implemented:
[+] Running PPA behind NAT. Administrators can configure PPA to run behind a router with NAT.
The following features have been improved:
The following bugs have been fixed:
[-] Administrators could not register Windows-based service nodes if the administrator’s password contained the ^ symbol.
April 8, 2013 Houston, TX- cPanel Inc., announces the release of cPanel & WHM software version 11.36 to the STABLE tier. Included in this brand new software release are further improvements to the update system, building on work started with cPanel & WHM 11.30. A new staging step during installation …
The following new functionality has been added:
[+] AWstats has been updated to version 7.1.1.
Note: New AWstats perceive wget as a robot.
The following bugs have been fixed:
[-] Error appeared after trying to edit default website widget in admin UI (133018)
[-] Phpmyadmin stuck when execute Update SQL query from GUI (132241)
(Apr 2) Applications using libxslt could be made to crash if they processed aspecially crafted file.
Ubuntu: 1788-1: Linux kernel (Oneiric backport) vulnerabilities
(Apr 3) Several security issues were fixed in the kernel.
Red Hat: 2013:0696-01: firefox: Critical Advisory
(Apr 2) Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical [More…]
Red Hat: 2013:0695-01: kernel: Important Advisory
(Apr 2) Updated kernel packages that fix one security issue are now available for Red Hat Enterprise Linux 5.6 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More…]