The following issue was resolved:
[-] Integration with Key Administrator Partner Central did not work in Plesk 11.5. (PPPM-1552)
Archive for April 10th, 2014
The Joomla! Project is pleased to announce the availability of Joomla! 3.3 Beta 2. Community members are asked to download and install the package in order to provide quality assurance for the forthcoming 3.3 release, which is scheduled for release on or around April 22nd, 2014.
A big thank you goes out to everyone that contributed to the 3.3 release! Joomla! 3.3 will be our most stable release ever. Right now we’re at about 320 commits since 3.2.3’s release with 41 different people contributing to those commits (not including testers and other non-coding activities). Best of all is that the new features are awesome!
The 3.x release series is the latest major release of the Joomla! CMS, with 3.3 the fourth standard-term support release in this series. Please note that going from 3.2 to 3.3 is a one-click upgrade and is NOT a migration. The same is true is for any subsequent versions in the 3.x series. That being said, please do not upgrade any of your production sites to the beta version as beta is ONLY intended for testing and there is no upgrade path from Beta.
Multiple Parallels products are potentially affected by the ‘Heartbleed Bug’ because they are based or installed on operating systems impacted by the OpenSSL CVE-2014-0160 vulnerabilities.
The OpenSSL group has published a solution at http://heartbleed.com/.
Additionally, please review and take action outlined in these Knowledgebase articles:
- For Parallels Automation: http://kb.parallels.com/en/120984
- For Parallels Business Automation Standard: http://kb.parallels.com/en/120986
- For Parallels Plesk Panel: http://kb.parallels.com/en/120990
- For Virtualization products: http://kb.parallels.com/en/120989
================================================================
Yesterday a new vulnerability was announced in OpenSSL 1.0.1 that allows an attacker to reveal up to 64kb of memory to a connected server. Parallels is working to assess any product specific issues as a result of this OpenSSL vulnerability. We encourage everyone running a server that uses OpenSSL to upgrade to version 1.0.1g to be protected. For previous versions of OpenSSL, re-compiling with the OPENSSL_NO_HEARTBEATS flag enabled will protect against this vulnerability. We will provide any product-specific updates as they become available.