(Feb 5) Perl could be made to run programs if it processed a specially craftedLocale::Maketext templates.
Archive for February, 2014
Ubuntu: 2100-1: Pidgin vulnerabilities
(Feb 6) Several security issues were fixed in Pidgin.
Red Hat: 2014:0137-01: flash-plugin: Critical Advisory
(Feb 5) An updated Adobe Flash Player package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More…]
Red Hat: 2014:0139-01: pidgin: Moderate Advisory
(Feb 5) Updated pidgin packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
Are there really lots of vulnerable Apache web servers?
Apache has been the most common web server on the internet since April 1996, and is currently used by 38% of all websites. Most nefarious activity takes place on compromised servers, but just how many of these Apache servers are actually vulnerable? The latest major release of the 2.4 stable branch is Apache 2.4.7, which was released […]
The Joomla! Project and the Production Leadership Team are proud to announce the release of Joomla! 3.2.2 which resolves a significant number of issues and bugs.
If you are currently running Joomla! 3.2, we recommend that you apply this update immediately via either the one-click update or the update downloads available at http://www.joomla.org/download.html. For other versions of the 3.x series, applying the update is recommended at the next convenient opportunity.
The Joomla Project is pleased to announce the immediate availability of Joomla 2.5.18.
Joomla 2.5.18 is a maintenance release. Most notably this release fixes errors that have been reported including:
- Articles missing for admins in front end
- Modules disappear at frontpage after clicking the article title
Also with this release, the enhanced password hashing via PHPass, available in Joomla 3.2.1, is now used with the 2.5 series.
The update process is very simple, and complete instructions are available here. Note that there are now easier and better ways of updating than copying the files with FTP.
Download
New Installations: Click here to download Joomla 2.5.18 (Full package) »
Update Package: Click here to download Joomla 2.5.18 (Update package) »
Note: Please read the update instructions before updating.
Instructions
*Please clear your browser’s cache after upgrading
Want to test drive Joomla? Try the online demo. Documentation is available for beginners.
Release Notes
Check the Joomla 2.5.18 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Statistics for the 2.5.18 release period
- 7 tracker issues fixed
See http://developer.joomla.org/version-2-5-18-release-notes.html for details of the tracker items fixed.
How can you help Joomla! development?
There are a variety of ways in which you can get actively involved with Joomla! It doesn’t matter if you are a coder, an integrator, or merely a user of Joomla!. You can contact the Joomla! Community Development Manager, David Hurley, to get more information, or if you are ready you can jump right into the Joomla! Bug Squad.
The Joomla! Bug Squad is one of the most active teams in the Joomla! development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla!, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla! Documentation Wiki and, if you wish to join, email Mark Dexter or Nick Savov, our Bug Squad co-coordinators.
You can also help Joomla! development by thanking those involved in the many areas of the process. In the past year, for example, over 1,100 bugs have been fixed by the Bug Squad.
Contributors
Thank you to the code contributors and active Bug Squad members that created and tested this release:
Achal Aggarwal, Amy Stephen, Brian Teeman, Camden Narzt, Chris Davenport, Cyril Rezé, Daniel Dimitrov, David Hurley, Dennis Hermacki, Don Gilbert, Edwin Cheront, Elijah Madden, Gary Mort, George Wilson, Gunjan Patel, Hannes Papenberg, Javier Gómez, Jean-Marie Simonet, Jozsef Tamas Herczeg, Kevin Griffiths, Kunal Bajpai, leo lammerink, Marc Antoine Thevenet, Matt Thomas, Max Sarte, Melih Tas, Michael Babker, Mohammad Hasani Eghtedar, Parth Lawate, Peter van Westen, Piotr Mocko, Puneet Kala, Robert Gastaud, Roberto Segura, Samuel Moffatt, Sander Potjer, Serge Litvinov, Simon Asika, Thomas Hunziker, Thomas Kuschel, Tino Brackebusch, Tobias Zulauf, Valentin Despa, Yannick Gaultier.
Joomla! Bug Squad
Thank you to the Joomla! Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla!, please report it on the Joomla! CMS Issue Tracker.
Active members of the Joomla! Bug Squad during past 3 months include: Achal Aggarwal, Anderson Martins, Artur StÄpieÅ, Ashan Fernando, Beat, Brian Teeman, Bruno Batista, Buddhima Wijeweera, Camden Narzt, Christelle Olivier, Constantin Romankiewicz, Cyril Rezé, Daniel Dimitrov, David Beuving, David Jardin, Demis Palma, Dennis Hermacki, easteregg easteregg, Edwin Cheront, Elijah Madden, Florian DAL FITTO, Gary Mort, George Wilson, Gunjan Patel, Hannes Papenberg, irbian irbian, Isabelle eff, Jérôme GLATIGNY, Jean-Marie Simonet, jelle kok, Jisse Reitsma, Jozsef Tamas Herczeg, Jurian Even, Kevin Griffiths, Kunal Bajpai, Lao Neo, leo lammerink, Marc Antoine Thevenet, Marcel van Beelen, Marijke Stuivenberg, Mark Dexter, Marko Đedović, Matias Aguirre, Matt Thomas, Max Sarte, Melih Tas, Michael Babker, Michael Dunkle, MIG Manickam, Mohammad Hasani Eghtedar, Nicholas Dionysopoulos, Ofer Cohen, Parth Lawate, patrick kohl, Peter van Westen, Piotr Gasiorowski, Piotr Mocko, Ray Lawlor, Robert Gastaud, Roberto Segura, Samuel Moffatt, Sander Potjer, Serge Litvinov, Simon Asika, Skullbock Skullbock, Stefania Gaianigo, Steve Binkowski, Thomas Hunziker, Thomas Jackson, Thomas Kuschel, Tino Brackebusch, Tobias Zulauf, Tom Hutchison, Valentin Despa, Yannick Gaultier.
Bug Squad Leadership: Mark Dexter and Nick Savov, Co-Coordinators.
Joomla! Security Strike Team
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla! secure. Members include: Airton Torres, Alan Langford, Beat, Bill Richardson, Claire Mandville, David Hurley, Don Gilbert, Gary Brooks, Jason Kendall, Javier Gomez, Jean-Marie Simonet, Marijke Stuivenberg, Mark Boos, Mark Dexter, Matias Griese, Michael Babker, Nick Savov, Pushapraj Sharma, Rouven Weßling.
The following component was updated:
[+](Windows) IceWarp Merak Mail server 11.0 x32 and x64-bit version is now supported.
The following issues were resolved:
[-] (Unix) “Access to the Control Panel” permission for mail accounts is not migrated from older Plesk version (PPPM-1337)
[-] (Windows) Error “c_accounts_policies_pass_upperalpha not found” occurs at switching to IceWarp Merak below version 10.3.0
[-] Unable to create subscription if mail server is not installed because of error “Discard mode not supported”
Case 84385 Summary Arbitrary code execution as cpanel-horde user via cache file poisioning. Security Rating cPanel has assigned a Security Level of Important to this vulnerability. Description The Horde Webmail interfaces accessible to cPanel and Webmail accounts uses PHP serialized cache files to speed up some backend operations. By default …
Debian: 2851-1: drupal6: impersonation
(Feb 2) Christian Mainka and Vladislav Mladenov reported a vulnerability in the OpenID module of Drupal, a fully-featured content management framework. A malicious user could exploit this flaw to log in as other users on the site, including administrators, and hijack their accounts. [More…]
Debian: 2850-1: libyaml: heap-based buffer overflow
(Jan 31) Florian Weimer of the Red Hat Product Security Team discovered a heap-based buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library. A remote attacker could provide a YAML document with a specially-crafted tag that, when parsed by an application using libyaml, [More…]
(Feb 3) libcurl could be made to expose sensitive information.
Red Hat: 2014:0127-01: librsvg2: Moderate Advisory
(Feb 3) Updated librsvg2 packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
Red Hat: 2014:0126-01: openldap: Moderate Advisory
(Feb 3) Updated openldap packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
Most Reliable Hosting Company Sites in January 2014
Rank Performance Graph OS Outagehh:mm:ss FailedReq% DNS […]
NIST continues using SHA-1 algorithm after banning it
The National Institute of Standards and Technology (NIST) is still using SSL certificates signed with the SHA-1 signature algorithm, despite issuing a Special Publication disallowing the use of this algorithm for digital signature generation after 2013. “SHA-1 shall not be used for digital signature generation after December 31, 2013.” — NIST recommendation The SSL […]
cPanel & WHM software version 11.36 has reached End of Life. In accordance with our EOL policy [http://docs.cpanel.net/twiki/bin/view/AllDocumentation/InstallationGuide/LongTermSupport],11.36 will continue functioning on servers. The last release of cPanel & WHM 11.36, being 11.36.2.13, will remain on our mirrors indefinitely. You may continue using this last release, but no further updates, …
cPanel has released new builds for all public update tiers. These updates provide targeted changes to address security concerns with the cPanel & WHM product. These builds are currently available to all customers via the standard update system. cPanel has rated these updates as having security impact levels ranging from …
In the February 2014 survey we received responses from 920,102,079
sites — over 58 million more than last month.
Microsoft gained a staggering 48 million sites this month, increasing its total by 19% — most of this growth is attributable to new sites hosted by
Nobis Technology Group. Along with Microsoft, nginx also made a large gain of […]
Joomla Community Magazine | February 2014
The February issue of the Joomla Community Magazine is here! Our stories this month:
Editors Introduction
All You Need is (Joomla!) Love…, by Dianne Henning
Feature Stories
Women in Joomla!, by Shirat Goldstein
Interview with Chad Windnagle, by Alice Grevet
What Exactly Goes Into Making a Release of the CMS?, by Michael Babker
Developers
Practical Development, by Marco Dings
Administrators
Some Tips for SEO in Joomla 3.0, by David Hoang
Events
CMS Africa Goes to Nairobi, Kenya, by Njenga Hakeenah
Save the Date!, by David Hurley
Project News
Leadership Highlights February 2014, by Marijke Stuivenberg
Roundup from JUG Corner – January 2014, by Ruth Cheesley
Sitebuilders
Joomla! 3.2 New Features: Extension Finder, by Nicola Galgano
Building Joomla Web-Help Systems – Part 1: Choosing an Environment, by Matt Majeske
To LTS or STS?… That is the Question!, by Duke Speer
International Stories
Browse the international articles submitted this month.
In our next issue
We want to publish your Joomla! story in the next JCM issue! So take a look at our Author Resources content to get a better idea of what we are looking for, and then register to become a JCM author and submit your Joomla! story!
(Jan 30) Applications using the OTR secure chat protocol could be made to exposesensitive information over the network.
(Jan 30) Several security issues were fixed in QEMU.
Ubuntu: 2093-1: libvirt vulnerabilities
(Jan 30) Several security issues were fixed in libvirt.
Ubuntu: 2094-1: Linux kernel (Raring HWE) vulnerability
(Jan 31) The system could be made to crash or run programs as an administrator.
Red Hat: 2014:0108-01: kernel: Moderate Advisory
(Jan 29) Updated kernel packages that fix one security issue and three bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More…]
Debian: 2849-1: curl: information disclosure
(Jan 31) Paras Sethia discovered that libcurl, a client-side URL transfer library, would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user. [More…]
Ubuntu: 2095-1: Linux kernel (Saucy HWE) vulnerability
(Jan 31) The system could be made to crash or run programs as an administrator.
Ubuntu: 2096-1: Linux kernel vulnerability
(Jan 31) The system could be made to crash or run programs as an administrator.
Red Hat: 2014:0112-01: openstack-nova: Moderate Advisory
(Jan 30) Updated openstack-nova packages that fix two security issues and three bugs are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having moderate [More…]
Red Hat: 2014:0113-01: openstack-keystone: Moderate Advisory
(Jan 30) Updated openstack-keystone packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having moderate [More…]