In the July 2014 survey we received responses from 996,106,380 sites. Microsoft gained 22 million sites this month, helping to increase its market share by 1.18 percentage points. Combined with a 1.78 point loss in Apache’s market share, Microsoft is now the new market leader with a 37.5% share of all sites. In the early […]
Archive for July, 2014
(Jul 29) Security Report Summary
(Jul 30) Several security issues were fixed in Tomcat.
Red Hat: 2014:0981-01: kernel: Important Advisory
(Jul 29) Updated kernel packages that fix multiple security issues, several bugs, and add one enhancement are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having [More…]
Debian: 2991-1: modsecurity-apache: Summary
(Jul 27) Security Report Summary
(Jul 27) Security Report Summary
Red Hat: 2014:0925-01: kernel: Important Advisory
(Jul 23) Updated kernel packages that fix two security issues are now available for Red Hat Enterprise Linux 6.4 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More…]
Red Hat: 2014:0949-01: kernel: Important Advisory
(Jul 28) Updated kernel packages that fix one security issue are now available for Red Hat Enterprise Linux 6.2 Advanced Update Support. The Red Hat Security Response Team has rated this update as having [More…]
Case 93317 Summary Limited SQL injection vulnerability in LeechProtect. Security Rating cPanel has assigned a Security Level of Minor to this vulnerability. Description The LeechProtect subsystem built into cPanel & WHM systems allows a website owner to disable HTTP logins for accounts that log in from too many distinct IP …
SUMMARY cPanel, Inc. has released EasyApache 3.26.3 with PHP version 5.5.15, Libxslt version 1.1.28 and Libxml2 version 2.9.1. This release addresses PHP vulnerability CVE-2014-4670 by fixing a bug in the SPL component, CVE-2012-6139 by fixing a bug in Libxslt, and fixes bugs in Libxml2 to address the following CVEs: CVE-2012-5134, …
Red Hat: 2014:0923-01: kernel: Important Advisory
(Jul 23) Updated kernel packages that fix two security issues are now available for Red Hat Enterprise Linux 7. The Red Hat Security Response Team has rated this update as having [More…]
Red Hat: 2014:0924-01: kernel: Important Advisory
(Jul 23) Updated kernel packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having [More…]
The following improvement has been made:
[*] Administrators can now set a server-wide limit on the number of scheduled backups that can be stored in one repository. The limits of all subscriptions and accounts are reduced to the server-wide value, if such a value is specified. The newly created subscriptions and accounts will have the specified limit by default. Users cannot set a greater limit than the server-wide one. (PPP-10831)
The following issues have been resolved:
[-] If users logged in using rsession, the Plesk interface language was English, even if these users previously selected another language in Interface Settings. (PPP-11069)
[-] (Linux) In Plesk 12.0, temporary backup files were stored in /tmp by default. This could cause the server not to respond if the size of backup files was bigger than the size of the directory. Temporary backup files are now stored in /usr/local/psa/PMM/tmp. (PPP-11008)
[-] (Linux) After the user had enabled the Atomic rule set for ModSecurity (web application firewall), ModSecurity (web application firewall) stopped working. (PPP-11007)
[-] Users could not restore the default DNS zone settings for domain aliases. The Restore the DNS Zone form did not appear. (PPP-10974)
[-] (Linux) Plesk installed on OpenVZ containers could not be configured after the upgrade to 12.0 because of the missing directory /dev/shm. (PPP-10830, PPPM-1655)
[-] (Linux) The Awstats statistics of the last day of the month was calculated incorrectly. (PPP-8850, PPPM-1486)
Ubuntu: 2294-1: Libtasn1 vulnerabilities
(Jul 22) Libtasn1 could be made to crash or run programs as your login if itprocessed specially crafted data.
Ubuntu: 2297-1: acpi-support vulnerability
(Jul 22) The system could be made to run programs as an administrator.
Red Hat: 2014:0939-01: python-django-horizon: Moderate Advisory
(Jul 24) Updated python-django-horizon packages that fix three security issues, multiple bugs, and add an enhancement are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise Linux 7. [More…]
Red Hat: 2014:0940-01: openstack-nova: Moderate Advisory
(Jul 24) Updated openstack-nova packages that fix one security issue and several bugs are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise Linux 7. [More…]
(Jul 24) Security Report Summary
(Jul 24) Security Report Summary
(Jul 24) A security issue was fixed in Jinja2.
(Jul 24) LZO could be made to crash or run programs if it processed speciallycrafted data.
Red Hat: 2014:0941-01: openstack-swift: Moderate Advisory
(Jul 24) Updated openstack-swift packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for Red Hat Enterprise Linux 7. [More…]
Red Hat: 2014:0888-01: qemu-kvm-rhev: Moderate Advisory
(Jul 24) Updated qemu-kvm-rhev packages that fix several security issues are now available for Red Hat Enterprise Linux OpenStack Platform 3.0 and 4.0. The Red Hat Security Response Team has rated this update as having Moderate [More…]
The Joomla! Project and the Production Leadership Team are proud to announce the release of Joomla! 3.3.3. This is a maintenance release for the 3.x series of Joomla! and addresses issues introduced in 3.3.2 with the e-mail cloaking code and user configuration options not applying correctly.
If you are currently running a Joomla! release on a server with PHP 5.3.10 or later, we encourage you to update immediately to Joomla! 3.3.3 via either the one-click update or the update downloads available at http://www.joomla.org/download.html.
Note that in order to update directly to 3.3.3 via the core update component, you must be running 3.2.2 or later due to the raised minimum supported PHP version and the update system not supporting checking the server’s PHP version in older releases. Older 3.x releases will be prompted to update to 3.2.4 before being presented the 3.3.3 update.
The Joomla Project is pleased to announce the immediate availability of Joomla 2.5.24. This is a maintenance release for the 2.5 series of Joomla! and addresses two issues found with the e-mail cloaking code introduced into the 2.5.23 release.
The update process is very simple, and complete instructions are available here. Note that there are now easier and better ways of updating than copying the files with FTP.
Download
New Installations: Click here to download Joomla 2.5.24 (Full package) »
Update Package: Click here to download Joomla 2.5.24 (Update packages) »
Note: Please read the update instructions before updating.
Instructions
*Please clear your browser’s cache after upgrading
Want to test drive Joomla? Try the online demo. Documentation is available for beginners.
Release Notes
Check the Joomla 2.5.24 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Statistics for the 2.5.24 release period
- 2 tracker issues fixed
How can you help Joomla! development?
There are a variety of ways in which you can get actively involved with Joomla! It doesn’t matter if you are a coder, an integrator, or merely a user of Joomla!. You can contact the Joomla! Community Development Manager, David Hurley, to get more information, or if you are ready you can jump right into the Joomla! Bug Squad.
The Joomla! Bug Squad is one of the most active teams in the Joomla! development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla!, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla! Documentation Wiki and, if you wish to join, email Mark Dexter or Nick Savov, our Bug Squad co-coordinators.
You can also help Joomla! development by thanking those involved in the many areas of the process. In the past year, for example, over 1,000 bugs have been fixed by the Bug Squad.
Contributors
Thank you to the code contributors and active Bug Squad members that created and tested this release:
A. Booij, Achal Aggarwal, Aditya Didwania, Anja Hage, Bernard Saulme, Brian Coale, Brian Teeman, Constantin Romankiewicz, Craig Phillips, Cristiano Cucco, Cyril Rezé, Demis Palma, Denise McLaurin, Dennis Hermacki, Elijah Madden, Eugen Istoc, George Wilson, Hannes Papenberg, Hilary Cheyne, Izhar Aazmi, Jean-Marie Simonet, Jisse Reitsma, Joe Steele, Khanh Le, Kyle Luzny, Leo Lammerink, Marko Đedović, Matt Thomas, Max Sarte, Nicholas Dionysopoulos, Niels van der Veer, Nha Bui, Peter Lose, Robert Dam, Robert Gastaud, Roberto Segura, Roland Dalmulder, Sam Moffatt, Sander Potjer, Thomas Hunziker, Tobias Zulauf, Valentin Despa, Viktor Vogel, Vlad Zinculescu.
Joomla! Bug Squad
Thank you to the Joomla! Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla!, please report it on the Joomla! Issue Tracker.
Active members of the Joomla! Bug Squad during past 3 months include: A. Booij, Achal Aggarwal, Anja Hage, Beat , Benjamin Trenkle, Bernard Saulme, Brian Teeman, Christiane Maier-Stadtherr, Constantin Romankiewicz, David Jardin, Dennis Hermacki, Elijah Madden, George Wilson, Hans Kuijpers, Hilary Cheyne, Jean-Marie Simonet, Jelle Kok, Jisse Reitsma, Joe Steele, Josien Verreijt, Leo Lammerink, Marcel van Beelen, Marco Richter, Matt Thomas, Max Sarte, Michael Babker, Mikhail M, Nick Savov, Nicholas Dionysopoulos, Niels van der Veer, Peter Lose, Peter Wiseman, Piotr Mocko, Robert Dam, Robert Gastaud, Roberto Segura, Roland Dalmulder, Sander Potjer, Sergio Manzi, Stefania Gaianigo, Thomas Hunziker, Thomas Jackson, Tobias Zulauf, Todor Iliev, Valentin Despa, Viktor Vogel.
Bug Squad Leadership: Mark Dexter and Nick Savov, Co-Coordinators.
Joomla! Security Strike Team
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla! secure. Members include: Airton Torres, Alan Langford, Beat, Bill Richardson, Claire Mandville, David Hurley, Don Gilbert, Gary Brooks, Jason Kendall, Javier Gomez, Jean-Marie Simonet, Marijke Stuivenberg, Mark Boos, Mark Dexter, Matias Griese, Michael Babker, Nick Savov, Pushapraj Sharma, Roberto Segura, Rouven Weßling, Thomas Hunziker.
(Jul 23) Security Report Summary
(Jul 23) Security Report Summary
(Jul 23) Several security issues were fixed in Oxide.
Ubuntu: 2299-1: Apache HTTP Server vulnerabilities
(Jul 23) Several security issues were fixed in Apache HTTP Server.
Red Hat: 2014:0927-01: qemu-kvm: Moderate Advisory
(Jul 23) Updated qemu-kvm packages that fix multiple security issues and various bugs are now available for Red Hat Enterprise Linux 7. The Red Hat Security Response Team has rated this update as having Moderate [More…]