Archive for Releases
[Product Update] Parallels Plesk Panel 12.0.18 MU#20
Release Notes
Parallels is pleased to introduce the update #20 for the version 12.0.18 of Parallels Plesk.
The 12.0.18 update #20 is recommended for all Plesk users. It includes resolution of the issues related to the stability, compatibility, and security of your server.
To ensure optimal server reliability and security, Parallels strongly recommends keeping your operating system and Plesk software up-to-date.
What’s Changed
The following issues were resolved:
[-] (Windows) Plesk reconfigurator could not find the utilities for repairing Plesk services on 64-bit Windows installations. (PPPM-2146)
[-] (Windows) Incorrect ASP.NET version was shown to Plesk users who did not have privileges to manage hosting settings. (PPPM-2153)
[-] (Windows) Applications that required ASP.NET could not be installed if the ASP.NET version supported by a hosting account did not satisfy the application’s requirements. (PPPM-2154)
Legend:
[+] – Added
[-] – Issue resolved
[*] – Improved
Installation Instructions
- #9294: Using Micro-Updates in Parallels Plesk Panel
[Security] [Plesk] CVE-2014-3566: POODLE attack exploiting SSL 3.0 fallback
Information
A CVE-2014-3566 vulnerability in SSLv3 protocol was identified by the Google security team. There is an additional whitepaper available from OpenSSL that also describes this vulnerability.
You can check if your are vulnerable using the following script as an
{!{code}!}czoxODc6XCIjIHdnZXQgaHR0cDovL2tiLnNwLnBhcmFsbGVscy5jb20vQXR0YWNobWVudHMva2NzLTQwMDA3L3Bvb2RsZS5zaAojIGN7WyYqJl19aG1vZCAreCBwb29kbGUuc2gKIyBmb3IgaSBpbiBgZWNobyAyMSA1ODcgNDQzIDQ2NSA3MDgxIDg0NDMgOTkzIDk5NSBgOyBkbyAvYntbJiomXX1pbi9zaCAvcm9vdC9wb29kbGUuc2ggJmx0O0lQJmd0OyAkaTsgZG9uZQpcIjt7WyYqJl19{!{/code}!}
Resolution
The attack described above requires an SSL 3.0 connection to be established, so disabling the SSL 3.0 protocol in the client or in the server (or both) will deflect a potential attack.
You may use special scripts below to disable SSLv3 for all the services:
- for Linux – disables Apache, nginx, proftpd, courier-imap, qmail, postfix, dovecot, Plesk server engine (for versions 11.5 and later).
- for Windows – disable SSlv3 server wide.
See instructions below to disable SSLv3 per service.
Apache HTTPD Server
If you’re running Apache, include the following line in your configuration file /etc/httpd/conf/httpd.conf
among the other SSL directives:
{!{code}!}czozMDpcIlNTTFByb3RvY29sIEFsbCAtU1NMdjIgLVNTTHYzClwiO3tbJiomXX0={!{/code}!}
And restart the server, e.g.
{!{code}!}czoyOTpcInN1ZG8gc2VydmljZSBhcGFjaGUyIHJlc3RhcnQKXCI7e1smKiZdfQ=={!{/code}!}
Nginx server
If you’re running Nginx, just include the following line in your configuration among the other SSL directives:
{!{code}!}czozNzpcInNzbF9wcm90b2NvbHMgVExTdjEgVExTdjEuMSBUTFN2MS4yOwpcIjt7WyYqJl19{!{/code}!}
additionally for all the sites in Plesk 11.5 for Linux:
{!{code}!}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{!{/code}!}
and sites in Plesk 12.0 for Linux:
{!{code}!}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{!{/code}!}
And reconfigure Apache:
{!{code}!}czo1NDpcIiMgL3Vzci9sb2NhbC9wc2EvYWRtaW4vYmluL2h0dHBkbW5nIC0tcmVjb25maWd1cmUtYWxsClwiO3tbJiomXX0={!{/code}!}
for all the sites in Plesk 10.4, 11.0.9 for Linux add to the Apache configuration file /etc/httpd/conf/httpd.conf
the following string:
{!{code}!}czozMDpcIlNTTFByb3RvY29sIEFsbCAtU1NMdjIgLVNTTHYzClwiO3tbJiomXX0={!{/code}!}
and restart Apache:
{!{code}!}czoyNzpcIiMgL2V0Yy9pbml0LmQvaHR0cGQgcmVzdGFyClwiO3tbJiomXX0={!{/code}!}
Reference: Nginx documentation
Dovecot IMAP/POP3 server
Include the following line in /etc/dovecot/dovecot.conf
{!{code}!}czozMDpcInNzbF9wcm90b2NvbHMgPSAhU1NMdjIgIVNTTHYzClwiO3tbJiomXX0={!{/code}!}
Restart service:
{!{code}!}czoyOTpcInN1ZG8gc2VydmljZSBkb3ZlY290IHJlc3RhcnQKXCI7e1smKiZdfQ=={!{/code}!}
Courier IMAP
Edit the following files:
/etc/courier-imap/pop3d-ssl
/etc/courier-imap/imapd-ssl
Add the following string:
{!{code}!}czo3NTpcIlRMU19DSVBIRVJfTElTVD1cIkFMTDohU1NMdjI6IVNTTHYzOiFBREg6IU5VTEw6IUVYUE9SVDohREVTOiFMT1c6QFNUUkVOe1smKiZdfUdUSFwiClwiO3tbJiomXX0={!{/code}!}
Or just modify existing one and add !SSLv3
into cipher list.
Restart services:
{!{code}!}czo3MTpcIiBzdWRvIHNlcnZpY2UgY291cmllci1pbWFwcyByZXN0YXJ0IHN1ZG8gc2VydmljZSBjb3VyaWVyLXBvcDNzIHJlc3RhcnR7WyYqJl19ClwiO3tbJiomXX0={!{/code}!}
Postfix SMTP
For ‘opportunistic SSL’ (encryption policy not enforced and plain is acceptable too), you don’t need to change anything. Even SSLv2 is better than plain, so if you need to secure your server you should be using ‘mandatory SSL’ mode anyway.
For ‘mandatory SSL’ mode being configured already, just add/change the smtpd_tls_mandatory_protocols setting. Add the following string to the /etc/postfix/main.cf
file:
{!{code}!}czo0NDpcInNtdHBkX3Rsc19tYW5kYXRvcnlfcHJvdG9jb2xzPSFTU0x2MiwhU1NMdjMKXCI7e1smKiZdfQ=={!{/code}!}
and restart Postfix:
{!{code}!}czoyOTpcInN1ZG8gc2VydmljZSBwb3N0Zml4IHJlc3RhcnQKXCI7e1smKiZdfQ=={!{/code}!}
You can verify if SSLv3 is disabled by using the following command:
{!{code}!}czo0NjpcIm9wZW5zc2wgc19jbGllbnQgLWNvbm5lY3QgbG9jYWxob3N0OjQ2NSAtc3NsMwpcIjt7WyYqJl19{!{/code}!}
If you are not vulnerable (SSLv3 disabled), your output should look something like this:
{!{code}!}czoyNDE6XCJDT05ORUNURUQoMDAwMDAwMDMpCjEzOTgwODYwNjEwNzQ2NDplcnJvcjoxNDA5NDQxMDpTU0wgcm91dGluZXM6U1NMM197WyYqJl19UkVBRF9CWVRFUzpzc2x2MyBhbGVydCBoYW5kc2hha2UgZmFpbHVyZTpzM19wa3QuYzoxMjU3OlNTTCBhbGVydCBudW1iZXIgNDAKMXtbJiomXX0zOTgwODYwNjEwNzQ2NDplcnJvcjoxNDA5RTBFNTpTU0wgcm91dGluZXM6U1NMM19XUklURV9CWVRFUzpzc2wgaGFuZHNoYWtlIGZhe1smKiZdfWlsdXJlOnMzX3BrdC5jOjU5NjoKXCI7e1smKiZdfQ=={!{/code}!}
If you are vulnerable, you should see normal connection output, including the line:
{!{code}!}czo2MDpcIkNPTk5FQ1RFRCgwMDAwMDAwMykKMjIwIG1haWwuZXhhbXBsZS5jb20gRVNNVFAgUG9zdGZpeApET05FClwiO3tbJiomXX0={!{/code}!}
Microsoft Internet Information Services
Official Microsoft knowledge base article about disabling particular protocol in IIS:
How to disable PCT 1.0, SSL 2.0, SSL 3.0, or TLS 1.0 in Internet Information Services
Microsoft Windows Server stores information about different security-enhanced channel protocols that Windows Server supports. This information is stored in the registry key.
-
Click Start, click Run, type
regedt32
or typeregedit
, and then click OK. -
In Registry Editor, locate the following registry key:
{!{code}!}czoxMDQ6XCJIS0VZX0xPQ0FMX01BQ0hJTkVcXFN5c3RlbVxcQ3VycmVudENvbnRyb2xTZXRcXENvbnRyb2xcXFNlY3VyaXR5UHJvdmlkZXJze1smKiZdfVxcU0NIQU5ORUxcXFByb3RvY29sc1xcU1NMIDMuMFxcU2VydmVyClwiO3tbJiomXX0={!{/code}!}
-
On the Edit menu, click Add Value.
-
In the
Data Type
list, clickDWORD
. -
In the
Value Nam
e box, typeEnabled
, and then click OK.Note: If this value is present, double-click the value to edit its current value.
-
Type
00000000
in Binary Editor to set the value of the new key equal to “0”. - Click OK. Restart the computer.
As Plesk is using the same SSL engine, sw-cp-server
service should be also configured to protect from SSL vulnerability.
Plesk 11.5 and later
Edit ‘/etc/sw-cp-server/config
’, add
{!{code}!}czozODpcIiBzc2xfcHJvdG9jb2xzIFRMU3YxIFRMU3YxLjEgVExTdjEuMjsKXCI7e1smKiZdfQ=={!{/code}!}
Restart:
{!{code}!}czozNTpcIiBzdWRvIHNlcnZpY2Ugc3ctY3Atc2VydmVyIHJlc3RhcnQKXCI7e1smKiZdfQ=={!{/code}!}
Plesk 11.0
Edit /usr/local/psa/admin/conf/ssl-conf.sh
, add the echo 'ssl.use-sslv3 = "disable"'
after the echo 'ssl.use-sslv2 = "disable"'
directive, so it should looks alike:
{!{code}!}czo5NzpcIiBlY2hvIFwnc3NsLmVuZ2luZSA9IFwiZW5hYmxlXCJcJyBlY2hvIFwnc3NsLnVzZS1zc2x2MiA9IFwiZGlzYWJsZVwiXCdgIGVjaG8gXCd7WyYqJl19c3NsLnVzZS1zc2x2MyA9IFwiZGlzYWJsZVwiXCcKXCI7e1smKiZdfQ=={!{/code}!}
Restart:
{!{code}!}czozNTpcIiBzdWRvIHNlcnZpY2Ugc3ctY3Atc2VydmVyIHJlc3RhcnQKXCI7e1smKiZdfQ=={!{/code}!}
[Security] [HUB] POODLE attack exploiting SSL 3.0 fallback
Information
A CVE-2014-3566 vulnerability in SSLv3 protocol was identified by the Google security team. There is an additional whitepaper available from OpenSSL that also describes this vulnerability.
You can check if your website is vulnerable with curl:
{!{code}!}czo0MTpcImN1cmwgLXYzIC1YIEhFQUQgaHR0cHM6Ly93d3cuZXhhbXBsZS5jb20KXCI7e1smKiZdfQ=={!{/code}!}
If you are NOT vulnerable, your output should look something like this:
{!{code}!}czoyOTpcImN1cmw6ICgzNSkgU1NMIGNvbm5lY3QgZXJyb3IKXCI7e1smKiZdfQ=={!{/code}!}
If you ARE vulnerable, you will see normal connection outputs, potentially including the line:
{!{code}!}czoyOTpcIlNTTCAzLjAgY29ubmVjdGlvbiB1c2luZyAuLi4KXCI7e1smKiZdfQ=={!{/code}!}
Resolution
Although the possibility to exploit this vulnerability is quite low, the simplest way is to disable SSL 3.0 – this obsoleted protocol version is being used for compatibility needs and is not required for Parallels products.
For specific Parallels products, here is the list of articles which you may refer to:
Oracle Critical Patch Update Advisory – October 2014
MySQL :: MySQL Enterprise Monitor 2.3.18 :: H.14 Changes in MySQL Enterprise Monitor 2.3.5 (2011-07-01)
You can subscribe to RSS or Atom feeds, linked from
Joomla Community Magazine | October 2014
The October issue of the Joomla Community Magazine is here! Our stories this month:
Editors Introduction
Joomla! World Conference 2014, Get Your Tickets Now!
Feature Stories
Interview with Brian Teeman
A New and Improved Joomla! Resources Directory
A Dream, Which we Dream Together, is Reality
Events
Upcoming Joomla Events October/November 2014
Project News
Leadership Highlights October 2014
A Thank You to OSM & the Joomla Community from CloudAccess.net
A Thank You to CloudAccess.net
Administrators
Investing in HTTPS is Crucial to Your Joomla Site’s Integrity
International Stories
Catalan
Open Source Matters tria nova presidenta, Sarah Watz…
Actualitzar Joomla! de la versió 2.5 a la 3.x
Français
Retour sur le JoomlaDay™ Bénin 2014
La création d’un article avec Joomla! n’a jamais été aussi facile !
Joomla! World Conference 2014, achetez vos billets maintenant !
Joomla! pour mon entreprise (partie 1)
Revenons aux fondamentaux : la puissance du collaboratif
Annonce de la création du Update Working Group
Joomla! annonce un nouveau site de démo et une option…
German
Der neue Joomla! Release Zyklus
Spanish
Premios y reconocimientos del CMS Joomla!
ACL en Joomla!
Desenredando Warp 7 y UIKIT
Un Nuevo Directorio de Recursos
Joomla! en La Rioja
In our next issue
We want to publish your Joomla! story in the next JCM issue! So take a look at our Author Resources content to get a better idea of what we are looking for, and then register to become a JCM author and submit your Joomla! story!
The Joomla! Project is pleased to announce the immediate availability of Joomla 3.3.6. This is a maintenance release addressing issues with yesterday’s 3.3.5 release. This release addresses an issue related to the core update component, one regression in the user password reset process, and adds a fallback upgrade mechanism for the update component. This release is considered a security release since it includes two resolved security issues associated with 3.3.5. A 3.2.7 release is also available for users who are still using Joomla! 3.2 which addresses the security issues and the upgrade component bug.
If you are currently running a Joomla! release on a server with PHP 5.3.10 or later, we encourage you to update immediately to Joomla! 3.3.6 via either the one-click update or the update downloads available at http://www.joomla.org/download.html.
Note that in order to update directly to 3.3.6 via the core update component, you must be running 3.2.2 or later due to the raised minimum supported PHP version and the update system not supporting checking the server’s PHP version in older releases. Older 3.x releases will be prompted to update to 3.2.7 before being presented the 3.3.6 update.
Special Download Instructions
Because of the issue with the update component, users who are running 3.2.6 or 3.3.5 will be unable to update to the next release using Joomla’s update component. These users will be required to update their Joomla! installation via the Extension Manager. Instructions for updating via the Extension Manager can be found on the Joomla! Documentation Wiki. Users who are running Joomla! 3.3.0 through 3.3.4 and 3.2.5 or earlier will be able to update using the update component. The Joomla! Documentation wiki contains full instructions on how to update your site.
The Joomla! Project is pleased to announce the immediate availability of Joomla 2.5.27. This is a maintenance release addressing issues with yesterday’s 2.5.26 release. This release addresses an issue related to the core update component. This release is considered a security release since it includes two resolved security issues associated with 2.5.26.
Special Download Instructions
Because of the issue with the update component, users who are running 2.5.26 will be unable to update to 2.5.27 using Joomla’s update component. These users will be required to update their Joomla! installation via the Extension Manager. Instructions for updating via the Extension Manager can be found on the Joomla! Documentation Wiki. Users who are running Joomla! 2.5.25 or earlier will be able to update using the update component. The Joomla! Documentation Wiki contains full instructions on how to update your site.
2.5 End of Life Update
As previously noted, the 2.5 series will reach end of life at the end of 2014, which will mark the end of support for this series. At this time, we project that 2.5.28 will be the last scheduled maintenance release, due in approximately six to eight weeks, the typical timeframe between Joomla! releases.
Download
New Installations: Download Joomla 2.5.27 (Full package) »
Update Package: Download Joomla 2.5.27 (Update packages) »
Note: Please read the update instructions before updating.
Instructions
*Please clear your browser’s cache after upgrading
Want to test drive Joomla? Try the online demo. Documentation is available for beginners.
Release Notes
Check the Joomla 2.5.27 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Statistics for the 2.5.27 release period
- 4 tracker issues fixed
See the Joomla! 2.5.26 Milestone on GitHub for details of the items fixed.
Security Issues Fixed
- High Priority – Core – Remote File Inclusion More information »
- Medium Priority – Core – Denial of Service More information »
How can you help Joomla! development?
There are a variety of ways in which you can get actively involved with Joomla! It doesn’t matter if you are a coder, an integrator, or merely a user of Joomla!. You can contact the Joomla! Community Development Manager, David Hurley, to get more information, or if you are ready you can jump right into the Joomla! Bug Squad.
The Joomla! Bug Squad is one of the most active teams in the Joomla! development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla!, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla! Documentation Wiki and, if you wish to join, email Nick Savov, our Bug Squad coordinator.
You can also help Joomla! development by thanking those involved in the many areas of the process. In the past year, for example, over 1,000 bugs have been fixed by the Bug Squad.
Contributors
Thank you to the community members who were active in the testing and resolution of the issues addressed in this release:
Constantin Romankiewicz, Dmitry Rekun, Jean-Marie Simonet, Johannes S-F, Michael Babker, Nicholas Dionysopoulos, Paulos Matos, Tobias Zulauf.
Joomla! Bug Squad
Thank you to the Joomla! Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla!, please report it on the Joomla! Issue Tracker.
Active members of the Joomla! Bug Squad during past 3 months include: A. Booij, Achal Aggarwal, Anja Hage, Beat , Benjamin Trenkle, Bernard Saulme, Brian Teeman, Christiane Maier-Stadtherr, Constantin Romankiewicz, David Jardin, Dennis Hermacki, Elijah Madden, George Wilson, Hans Kuijpers, Hilary Cheyne, Jean-Marie Simonet, Jelle Kok, Jisse Reitsma, Joe Steele, Josien Verreijt, Leo Lammerink, Marcel van Beelen, Marco Richter, Matt Thomas, Max Sarte, Michael Babker, Mikhail M, Nick Savov, Nicholas Dionysopoulos, Niels van der Veer, Peter Lose, Peter Wiseman, Piotr Mocko, Robert Dam, Robert Gastaud, Roberto Segura, Roland Dalmulder, Sander Potjer, Sergio Manzi, Stefania Gaianigo, Thomas Hunziker, Thomas Jackson, Tobias Zulauf, Todor Iliev, Valentin Despa, Viktor Vogel.
Bug Squad Leadership: Nick Savov, Coordinator.
Joomla! Security Strike Team
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla! secure. Members include: Airton Torres, Alan Langford, Beat, Bill Richardson, Claire Mandville, David Hurley, Don Gilbert, Gary Brooks, Jason Kendall, Javier Gomez, Jean-Marie Simonet, Marijke Stuivenberg, Mark Boos, Mark Dexter, Matias Griese, Michael Babker, Nick Savov, Pushapraj Sharma, Roberto Segura, Rouven Weßling, Thomas Hunziker.
The Joomla! Project and the Production Leadership Team are proud to announce the release of Joomla! 3.3.5. This is a security release for the 3.x series of Joomla! and addresses two security issues in addition to several regressions introduced in the 3.3.4 release. A 3.2.6 release is also available for users who are still using Joomla! 3.2 which addresses the security issues.
If you are currently running a Joomla! release on a server with PHP 5.3.10 or later, we encourage you to update immediately to Joomla! 3.3.4 via either the one-click update or the update downloads available at http://www.joomla.org/download.html.
Note that in order to update directly to 3.3.5 via the core update component, you must be running 3.2.2 or later due to the raised minimum supported PHP version and the update system not supporting checking the server’s PHP version in older releases. Older 3.x releases will be prompted to update to 3.2.6 before being presented the 3.3.5 update.
Oracle Security Alert for CVE-2014-7169 – 26 September 2014
Version 4.0 of WordPress, named “Benny” in honor of jazz clarinetist and bandleader Benny Goodman, is available for download or update in your WordPress dashboard. While 4.0 is just another number for us after 3.9 and before 4.1, we feel we’ve put a little extra polish into it. This release brings you a smoother writing and management experience […]
The first release candidate for WordPress 4.0 is now available! In RC 1, we’ve made refinements to what we’ve been working on for this release. Check out the Beta 1 announcement post for more details on those features. We hope to ship WordPress 4.0 next week, but we need your help to get there. If you […]
The fourth and likely final beta for WordPress 4.0 is now available. We’ve made more than 250 changes in the past month, including: Further improvements to the editor scrolling experience, especially when it comes to the second column of boxes. Better handling of small screens in the media library modals. A separate bulk selection mode […]
WordPress 3.9.2 is now available as a security release for all previous versions. We strongly encourage you to update your sites immediately. This release fixes a possible denial of service issue in PHP’s XML processing, reported by Nir Goldshlager of the Salesforce.com Product Security Team. It was fixed by Michael Adams and Andrew Nacin of the WordPress […]
Joomla Community Magazine | August 2014
The August issue of the Joomla Community Magazine is here! Our stories this month:
Editors Introduction
Feature Stories
Joomla Project and Product Marketing. One Can Not Exist Without the Other!
Pizza, Bugs and Fun in The Netherlands
Cum Munus – J and Beyond 2014
The Nasty Business of Passing Off
Talking Joomla! at WordCamp?
The Heart of Joomla! is the Community
Developers
Video: David Hurley Becomes Joomla! 3.4 Release Leader
Introducing The Wheel (The Power of Collaboration)
Project News
Leadership Highlights August 2014
Events
Roundup from JUG Corner – July 2014
Upcoming Joomla! Events – August & September 2014
JoomlaDay Minnesota and the Hope for a Local Joomla! Community
Joomla! Bug Sprint in Manchester
Designers
Book Reviews
Google Summer of Code
Keep Calm and Write Test
An Easy Way to Benchmark a Webserver
Project: JIssues Tracker Status Update
Why Simple Structured Data (Microdata, RDFa) isn’t so Simple
International Stories
Français
Créer facilement son site avec Joomla! (partie 2)
Le Tour d’Adresse du Développeur
J’ai le même problème…
Portuguese (Brazil)
Joomla Day Cidade do México 2014
Spanish
Resultados del Joomla Day Ciudad de México 2014
J&Bellong, Joomla y el marketing
01. Instalar VirtueMart 2.6.6
Joomla! Para Diseñadores
Tutorial: MasterBootstrap, instalación y puesta a punto
Joomla en las Administraciones locales
¿Qué podemos hacer para cambiar la tendencia?
In our next issue
We want to publish your Joomla! story in the next JCM issue! So take a look at our Author Resources content to get a better idea of what we are looking for, and then register to become a JCM author and submit your Joomla! story!
The following improvement has been made:
[*] Administrators can now set a server-wide limit on the number of scheduled backups that can be stored in one repository. The limits of all subscriptions and accounts are reduced to the server-wide value, if such a value is specified. The newly created subscriptions and accounts will have the specified limit by default. Users cannot set a greater limit than the server-wide one. (PPP-10831)
The following issues have been resolved:
[-] If users logged in using rsession, the Plesk interface language was English, even if these users previously selected another language in Interface Settings. (PPP-11069)
[-] (Linux) In Plesk 12.0, temporary backup files were stored in /tmp by default. This could cause the server not to respond if the size of backup files was bigger than the size of the directory. Temporary backup files are now stored in /usr/local/psa/PMM/tmp. (PPP-11008)
[-] (Linux) After the user had enabled the Atomic rule set for ModSecurity (web application firewall), ModSecurity (web application firewall) stopped working. (PPP-11007)
[-] Users could not restore the default DNS zone settings for domain aliases. The Restore the DNS Zone form did not appear. (PPP-10974)
[-] (Linux) Plesk installed on OpenVZ containers could not be configured after the upgrade to 12.0 because of the missing directory /dev/shm. (PPP-10830, PPPM-1655)
[-] (Linux) The Awstats statistics of the last day of the month was calculated incorrectly. (PPP-8850, PPPM-1486)
The Joomla! Project and the Production Leadership Team are proud to announce the release of Joomla! 3.3.3. This is a maintenance release for the 3.x series of Joomla! and addresses issues introduced in 3.3.2 with the e-mail cloaking code and user configuration options not applying correctly.
If you are currently running a Joomla! release on a server with PHP 5.3.10 or later, we encourage you to update immediately to Joomla! 3.3.3 via either the one-click update or the update downloads available at http://www.joomla.org/download.html.
Note that in order to update directly to 3.3.3 via the core update component, you must be running 3.2.2 or later due to the raised minimum supported PHP version and the update system not supporting checking the server’s PHP version in older releases. Older 3.x releases will be prompted to update to 3.2.4 before being presented the 3.3.3 update.
The Joomla Project is pleased to announce the immediate availability of Joomla 2.5.24. This is a maintenance release for the 2.5 series of Joomla! and addresses two issues found with the e-mail cloaking code introduced into the 2.5.23 release.
The update process is very simple, and complete instructions are available here. Note that there are now easier and better ways of updating than copying the files with FTP.
Download
New Installations: Click here to download Joomla 2.5.24 (Full package) »
Update Package: Click here to download Joomla 2.5.24 (Update packages) »
Note: Please read the update instructions before updating.
Instructions
*Please clear your browser’s cache after upgrading
Want to test drive Joomla? Try the online demo. Documentation is available for beginners.
Release Notes
Check the Joomla 2.5.24 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Statistics for the 2.5.24 release period
- 2 tracker issues fixed
How can you help Joomla! development?
There are a variety of ways in which you can get actively involved with Joomla! It doesn’t matter if you are a coder, an integrator, or merely a user of Joomla!. You can contact the Joomla! Community Development Manager, David Hurley, to get more information, or if you are ready you can jump right into the Joomla! Bug Squad.
The Joomla! Bug Squad is one of the most active teams in the Joomla! development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla!, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla! Documentation Wiki and, if you wish to join, email Mark Dexter or Nick Savov, our Bug Squad co-coordinators.
You can also help Joomla! development by thanking those involved in the many areas of the process. In the past year, for example, over 1,000 bugs have been fixed by the Bug Squad.
Contributors
Thank you to the code contributors and active Bug Squad members that created and tested this release:
A. Booij, Achal Aggarwal, Aditya Didwania, Anja Hage, Bernard Saulme, Brian Coale, Brian Teeman, Constantin Romankiewicz, Craig Phillips, Cristiano Cucco, Cyril Rezé, Demis Palma, Denise McLaurin, Dennis Hermacki, Elijah Madden, Eugen Istoc, George Wilson, Hannes Papenberg, Hilary Cheyne, Izhar Aazmi, Jean-Marie Simonet, Jisse Reitsma, Joe Steele, Khanh Le, Kyle Luzny, Leo Lammerink, Marko Đedović, Matt Thomas, Max Sarte, Nicholas Dionysopoulos, Niels van der Veer, Nha Bui, Peter Lose, Robert Dam, Robert Gastaud, Roberto Segura, Roland Dalmulder, Sam Moffatt, Sander Potjer, Thomas Hunziker, Tobias Zulauf, Valentin Despa, Viktor Vogel, Vlad Zinculescu.
Joomla! Bug Squad
Thank you to the Joomla! Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla!, please report it on the Joomla! Issue Tracker.
Active members of the Joomla! Bug Squad during past 3 months include: A. Booij, Achal Aggarwal, Anja Hage, Beat , Benjamin Trenkle, Bernard Saulme, Brian Teeman, Christiane Maier-Stadtherr, Constantin Romankiewicz, David Jardin, Dennis Hermacki, Elijah Madden, George Wilson, Hans Kuijpers, Hilary Cheyne, Jean-Marie Simonet, Jelle Kok, Jisse Reitsma, Joe Steele, Josien Verreijt, Leo Lammerink, Marcel van Beelen, Marco Richter, Matt Thomas, Max Sarte, Michael Babker, Mikhail M, Nick Savov, Nicholas Dionysopoulos, Niels van der Veer, Peter Lose, Peter Wiseman, Piotr Mocko, Robert Dam, Robert Gastaud, Roberto Segura, Roland Dalmulder, Sander Potjer, Sergio Manzi, Stefania Gaianigo, Thomas Hunziker, Thomas Jackson, Tobias Zulauf, Todor Iliev, Valentin Despa, Viktor Vogel.
Bug Squad Leadership: Mark Dexter and Nick Savov, Co-Coordinators.
Joomla! Security Strike Team
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla! secure. Members include: Airton Torres, Alan Langford, Beat, Bill Richardson, Claire Mandville, David Hurley, Don Gilbert, Gary Brooks, Jason Kendall, Javier Gomez, Jean-Marie Simonet, Marijke Stuivenberg, Mark Boos, Mark Dexter, Matias Griese, Michael Babker, Nick Savov, Pushapraj Sharma, Roberto Segura, Rouven Weßling, Thomas Hunziker.
The Joomla! Project and the Production Leadership Team are proud to announce the release of Joomla! 3.3.2. This is a maintenance release for the 3.x series of the Joomla! CMS.
If you are currently running a Joomla! release on a server with PHP 5.3.10 or later, we encourage you to update immediately to Joomla! 3.3.2 via either the one-click update or the update downloads available at http://www.joomla.org/download.html.
Note that in order to update directly to 3.3.2 via the core update component, you must be running 3.2.2 or later due to the raised minimum supported PHP version and the update system not supporting checking the server’s PHP version in older releases. Older 3.x releases will be prompted to update to 3.2.4 before being presented the 3.3.2 update.
The Joomla Project is pleased to announce the immediate availability of Joomla 2.5.23. This is a maintenance release for the 2.5 series of the Joomla! CMS.
The update process is very simple, and complete instructions are available here. Note that there are now easier and better ways of updating than copying the files with FTP.
Download
New Installations: Click here to download Joomla 2.5.23 (Full package) »
Update Package: Click here to download Joomla 2.5.23 (Update package) »
Note: Please read the update instructions before updating.
Instructions
*Please clear your browser’s cache after upgrading
Want to test drive Joomla? Try the online demo. Documentation is available for beginners.
Release Notes
Check the Joomla 2.5.23 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Statistics for the 2.5.23 release period
- 8 tracker issues fixed
See http://developer.joomla.org/version-2-5-23-release-notes.html for details of the tracker items fixed.
How can you help Joomla! development?
There are a variety of ways in which you can get actively involved with Joomla! It doesn’t matter if you are a coder, an integrator, or merely a user of Joomla!. You can contact the Joomla! Community Development Manager, David Hurley, to get more information, or if you are ready you can jump right into the Joomla! Bug Squad.
The Joomla! Bug Squad is one of the most active teams in the Joomla! development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla!, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla! Documentation Wiki and, if you wish to join, email Mark Dexter or Nick Savov, our Bug Squad co-coordinators.
You can also help Joomla! development by thanking those involved in the many areas of the process. In the past year, for example, over 1,000 bugs have been fixed by the Bug Squad.
Contributors
Thank you to the code contributors and active Bug Squad members that created and tested this release:
A. Booij, Achal Aggarwal, Aditya Didwania, Anja Hage, Bernard Saulme, Brian Coale, Brian Teeman, Constantin Romankiewicz, Craig Phillips, Cristiano Cucco, Cyril Rezé, Demis Palma, Denise McLaurin, Dennis Hermacki, Elijah Madden, Eugen Istoc, George Wilson, Hannes Papenberg, Hilary Cheyne, Izhar Aazmi, Jean-Marie Simonet, Jisse Reitsma, Joe Steele, Khanh Le, Kyle Luzny, Leo Lammerink, Marko Đedović, Matt Thomas, Max Sarte, Nicholas Dionysopoulos, Niels van der Veer, Nha Bui, Peter Lose, Robert Dam, Robert Gastaud, Roberto Segura, Roland Dalmulder, Sam Moffatt, Sander Potjer, Thomas Hunziker, Tobias Zulauf, Valentin Despa, Viktor Vogel, Vlad Zinculescu.
Joomla! Bug Squad
Thank you to the Joomla! Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla!, please report it on the Joomla! CMS Issue Tracker.
Active members of the Joomla! Bug Squad during past 3 months include: A. Booij, Achal Aggarwal, Anja Hage, Beat , Benjamin Trenkle, Bernard Saulme, Brian Teeman, Christiane Maier-Stadtherr, Constantin Romankiewicz, David Jardin, Dennis Hermacki, Elijah Madden, George Wilson, Hans Kuijpers, Hilary Cheyne, Jean-Marie Simonet, Jelle Kok, Jisse Reitsma, Joe Steele, Josien Verreijt, Leo Lammerink, Marcel van Beelen, Marco Richter, Matt Thomas, Max Sarte, Michael Babker, Mikhail M, Nick Savov, Nicholas Dionysopoulos, Niels van der Veer, Peter Lose, Peter Wiseman, Piotr Mocko, Robert Dam, Robert Gastaud, Roberto Segura, Roland Dalmulder, Sander Potjer, Sergio Manzi, Stefania Gaianigo, Thomas Hunziker, Thomas Jackson, Tobias Zulauf, Todor Iliev, Valentin Despa, Viktor Vogel.
Bug Squad Leadership: Mark Dexter and Nick Savov, Co-Coordinators.
Joomla! Security Strike Team
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla! secure. Members include: Airton Torres, Alan Langford, Beat, Bill Richardson, Claire Mandville, David Hurley, Don Gilbert, Gary Brooks, Jason Kendall, Javier Gomez, Jean-Marie Simonet, Marijke Stuivenberg, Mark Boos, Mark Dexter, Matias Griese, Michael Babker, Nick Savov, Pushapraj Sharma, Roberto Segura, Rouven Weßling, Thomas Hunziker.
What’s Changed
[*] PPA now calculates disk usage for SmarterMail domains and mailboxes.
[*] The checker of service nodes for compatibility with Plesk Automation (check_service_node) was significantly improved.
[*] Before a PPA upgrade/update, the following conditions are checked: YUM is installed and properly configured, YUM repositories are accessible on the management and service nodes.
[-] Users could not search by Active at the Service Templates screen. A system error occurred. (PPA-1521)
[-] Mailboxes with names in mixed case stopped working after upgrade from PPA 11.1 to 11.5. (PPA-1232)
[-] Users could not switch on auto-reply for mailboxes on domains that had domain aliases. (PPA-1313)
[-] Administrators could not create a subscription with support for mail services if the webmail node was uninstalled. (PPA-1346)
[-] After upgrading or updating to PPA 11.5.*, the default Plesk license appeared in the License Manager. (PPA-1428)
[-] After updating to PPA 11.5.5, administrators could not set the ‘Allow overuse of disk space and traffic’ activation parameter for a subscription. The parameter did not appear in the list of the subscription’s resources. (PPA-1456)
[-] DNS PTR records for a subscription were not removed on the subscription removal. (PPA-1476)
[-] Users could not use the webmail service if they were subscribed to Roundcube webmail. (PPA-1497)
[-] When users modified a DNS zone and removed both A and NS records, the DNS zone synchronization failed. The following error occurred: NS record “<domain>. NS ns.<domain>.” has no address records (A or AAAA). (PPA-1560)
[-] Users could see uninformative error messages while managing domain aliases. (PPA-168)
[-] Administrators could not remove subscriptions with support for database services if the database service node was registered with a backnet IP address. (PPA-533)
[-] Update from PPA 11.5.1 was taking too much time. (PPA-653)
[-] Administrators could not install a node with the mixed ‘Apache + Postfix + MySQL + PostgreSQL’ role, if a hyphen was used in the PostgreSQL administrator’s username. They were not informed that the hyphen cannot be used for the PostgreSQL administrator’s username either. (PPA-695)
[-] Updates could fail and administrators had to restart the update because of slow restart. (PPA-725)
[-] Administrators could not add a server with already installed MSSQL as a new MSSQL service node. The error message did not explain how to register an existing database server in the system. (PPA-773)
[-] Administrators could not change the host name of a service node based on Windows Server 2012 R2. The following error occurred: Failed to retrieve the host name of the node: ERROR: Cannot open control pipe – NT_STATUS_INVALID_PARAMETER. (PPA-923)
[-] Restoration of a backup and migration failed if there were system users with the same name on different nodes. The following error occurred: System user <username> doesn’t belong to domain being restored. (PPA-1032)
[-] Administrators could not create a subscription if the SSL certificate for the domain was modified. The following error occurred: SSLCACertificateFile: file ‘/usr/local/psa/var/certificates/<cert-name>’ does not exist or is empty. (PPA-1042)
[-] Customers could see the ‘Access to subscriptions’ permission instead of ‘Access to webspaces’ in the Hosting Panel > Users > a user’s settings. (PPA-1118)
[-] A domain’s webmail configuration file /etc/httpd/conf/plesk.conf.d/webmails/<lwebmail>/<domain>_webmail.conf was not removed on the subscription removal if webmail was hosted on a service node. (PPA-1143)
[-] Administrators received the error message about the main PPA licence expiration when the PPA license was valid, but the POA license was uploaded separately and expired. (PPA-1152)
[-] Users with the Application user role and a mail account could access the Mail tab in the Hosting Panel even when the webspace was disabled and the redirection loop occurred on this tab. (PPA-1165)
[-] Customers could not recalculate actual disk space used by mailboxes through the Hosting Panel > Mail > Refresh Usage Stats. The zero usage for all mailboxes on the domain was shown. (PPA-1196)
[-] When administrators added an MSSQL service node, the Customer Data folder remained empty and was not used as the data directory for MSSQL node. (PPA-1225)
[-] The limit on the number of connections per IP in Courier IMAP server configuration was reset to default after upgrade from PPA 11.1 to 11.5. (PPA-1231)
[-] Administrators received an unclear error message when they tried to install a new Linux node and there was a duplicate host name record in /etc/hosts. (PPA-1576)
[-] When administrators changed the host name of a service node with the ppa.hostname utility, several occurrences of the old host name remained in the ‘plesk’ database. (PPA-1067)
The following issues have been resolved:
[-] Users could not access the website folder for managing files of the website if Classic List was selected in Websites & Domains > Domains List Settings. The following error occurred: “Invalid URL was requested”. (PPP-10818)
[-] (Linux) Administrators could not create a backup of the server. The error message about the wrong format of the backup file appeared. (PPP-10804)
[-] The administrator’s interface language switched back to default (English) after visiting the Tools & Settings > Backup Manager > Scheduled Backup Setting screen. (PPP-10784, PPPM-1738)
[-] If users customized their domain PHP settings and then the administrator modified other settings on their subscription, the domain PHP setting changed back to default. (PPP-10744, PPPM-1779)
[-] (Linux) Administrators could not migrate reseller’s subscriptions without migrating the reseller. (PPP-10691, PPPM-1754)
[-] (Windows) On Windows 2012 x64, Plesk administrators could not install a Plesk license key on Plesk inside a Hyper-V virtual machine. The error saying that the license key is invalid occurred.
[-] (Windows) Administrators could not migrate domains with a remote MSSQL database if the MSSQL server was running on any port other than default 1433. (PPP-10800, PPPM-1802)
The following functionality was improved:
[*]Security improvements (http://kb.parallels.com/en/122245)
Important: Regular updates of Parallels Plesk Panel and third-party components guarantee that your server stays secure against malicious attacks.
The following functionality was improved:
[*]Security improvements (http://kb.parallels.com/en/122245)
Important: Regular updates of Parallels Plesk Panel and third-party components guarantee that your server stays secure against malicious attacks.
WordPress 4.0 Beta 2 is now available for download and testing. This is software still in development, so we don’t recommend that you run it on a production site. To get the beta, try the WordPress Beta Tester plugin (you’ll want “bleeding edge nightlies”). Or you can download the beta here (zip). For more of what’s new in version 4.0, check out […]
To provide users with an interface for managing NAT, a new extension, called NAT Manager, was created by means of Plesk Extensions SDK.
Oracle Critical Patch Update Advisory – July 2014
The following issues have been resolved:
[-] If Plesk was installed without a DNS service, administrators could not create subscriptions. The following error occurred: “Call to a member function isNeedUpdate() on a non-object in /opt/psa/admin/plib/PhDomain.php”. (PPP-10817)
[-] (Linux) Administrators could not upgrade the Plesk server to the version 12.0 from an earlier version if they had the mod_security package installed on the server. The following error occurred: “You have already installed the mod_security package which is not from Panel distribution. You should deinstall the mod_security package before the ‘modsecurity’ component installation, otherwise your Apache web-server will be broken”. (PPP-10791, PPPM-1798)
[-] Users could not access the File Manager if Classic List was selected in Websites & Domains > Domains List Settings. The following error occurred: “Invalid URL was requested”. (PPP-10783, PPPM-1795)
[-] Users could not see status messages for extensions. (PPP-10776)
[-] Users could not restore from an FTP repository any backup created on the same Plesk server unless they selected the option Restore the backup file despite a corrupted signature. The Restore button was inactive. (PPP-10767)
[-] (Linux) On openSuSE 13.1 x32, after a server restart, the FTP service stopped working. (PPP-10750)
[-] (Linux) Temporary files of messages were not removed from the /usr/local/psa/handlers/spool/ directory if greylisting spam protection was switched on. This might cause a lack of disk space. (PPP-10705, PPPM-1766)
[-] Users could not see some form validation messages when Japanese was selected as Plesk interface language. (PPP-10702, PPPM-1763)
[-] Users could not change hosting settings for the main domain on their subscription if there were a lot of additional domains, subdomains, and/or domain aliases. The following error message was shown: “This operation is taking too long. Check the results in a few minutes”. (PPP-10698, PPPM-1762)
[-] (Windows) Administrators could not restore file permissions in the webspace with the repair.exe utility. It repaired only folder permissions. (PPP-10729, PPPM-1745)
WordPress 4.0 Beta 1 is now available! This software is still in development, so we don’t recommend you run it on a production site. Consider setting up a test site just to play with the new version. To test WordPress 4.0, try the WordPress Beta Tester plugin (you’ll want “bleeding edge nightlies”). Or you can […]