The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
Archive for Releases
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Critical security enhancement. Removal of malware which is possible to exploit without authenticating. Infected nodes might be known to and exploited by hackers.
The following bug has been fixed:
[-] Unable to backup subscription with application which contains apostrophe character in application parameter value. (98277)
[-] Custom error page to type ‘URL’, may cause wrong redirect (116078)
[-] Plesk does not report any readable error if hosting panel user is absent in database (81626)
[-] Parallels Premium Outbound Antispam license could not be applied (119721)
[-] Scheduled backups don’t run after upgrade to 11.0.9 (91080)
The following bug has been fixed:
[-] Unable to backup subscription with application which contains apostrophe character in application parameter value. (98277)
[-] Custom error page to type ‘URL’, may cause wrong redirect (116078)
[-] Plesk does not report any readable error if hosting panel user is absent in database (81626)
[-] Parallels Premium Outbound Antispam license could not be applied (119721)
[-] Scheduled backups don’t run after upgrade to 11.0.9 (91080)
Ubuntu 12.04.1 is supported now in Plesk 11.0.9.
Oracle Critical Patch Update Advisory – October 2012
Oracle Java SE Critical Patch Update Advisory – October 2012
Plesk Service Team is pleased to announce online Plesk Troubleshooters.
Plesk Troubleshooters help you diagnose and solve technical problems that are occurring with your Plesk server. When you start a troubleshooter, you should provide exact error message from Plesk or system log file related to the problem you are having. This information helps troubleshooter to find solution of problem.
Please share your opinion, experience, recommendations and so on here: http://forum.parallels.com/showthread.php?t=264029
Thank you for your cooperation!
Two weeks after the first beta, WordPress 3.5 Beta 2 is now available for download and testing. This is software still in development, so we don’t recommend that you run it on a production site. Set up a test site to play with the new version. To test WordPress 3.5, try the WordPress Beta Tester plugin (you’ll want “bleeding […]
The following bug has been fixed:
[-] “Default domain” for IP address can’t be changed from one domain to another.
[-] Database copying process hangs after lost connection with MySQL.
[-] Migration fails if site application already exists on destination server.
[-] httpdmng –reconfigure-all fails with error “MySQL server has gone away”.
[-] Not valid XML breaks site application restoring.
[-] There is unable to browse default domain on IP address because of wrong nginx configuration.
[-] vhosts_bootstrap.conf is misconfigured after stop/start nginx service.
[-] Conflict resolving process fails when migration alot of plesk entities with error “MySQL server has gone away”.
[-] “Default domain” for IP address can’t be changed from one domain to another (104647)
[-] Conflict resolving process fails when migration alot of plesk entities with error “MySQL server has gone away” (112291, 115718)
[-] Not valid XML breaks site application restoring
[-] Migration fails if site application already exists on destination server
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
The Joomla Project is pleased to announce the immediate availability of Joomla 3.0.1. This is a security release. This release also fixes several high-priority problems with version 3.0.0.
IMPORTANT NOTE FOR 3.0.0 SITES: If you plan to update a site from 3.0.0 to 3.0.1, you need to install the Joomla 3.0.0 Hot Patch before doing the update to Joomla 3.0.1. See the Hot Patch Instructions for more information. This is NOT required for updating from version 2.5.x. If you require the FTP layer you will need to manually FTP the update. Also, please note that version 3.0 users need to make sure the Update server is set to “Short Term Support” in the Joomla! Update component. Otherwise, no 3.0.x updates will show.
The Production Leadership Team’s goal is to continue to provide regular, frequent updates to the Joomla community. Learn more about Joomla! development at the Developer Site.
Download
New Installations: Click here to download Joomla 3.0.1 (Full package) »
Hot Patch (required for update from 3.0.0): Click here to download Joomla 3.0.0 Hot Patch »
Update Package: Click here to download Joomla 3.0.0 to 3.0.1 (Update package) »
Update Package: Click here to download Joomla 3.0.1 (for updates from Joomla 2.5) (Update package) »
Note: Please read the special update instructions before updating. Updating from 3.0.0 requires that you apply the hot patch first.
Instructions
Want to test drive Joomla? Try the online demo or the Joomla JumpBox. Documentation is available for beginners.
Please note that you should always backup your site before upgrading.
Release Notes
Check the Joomla 3.0.1 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Statistics for the 3.0.1 release period
- Joomla 3.0.1 contains:
- 1 security issue fixed
- 1 new feature
- 47 tracker issues fixed
Security Issues Fixed
- Low Priority – Core – XSS Vulnerability. More information »
New Feature
- 29445 Allow different update packages for different version dev levels
Until now, for both core auto updates and extension updates, update packages have been controlled by the 2-digit version number (e.g., 2.5, 3.0). It is not possible,for example, to have users of version 3.0.0 install a different update package than users of 3.0.1. This means the update packages are larger than they need to be. This feature allows for checking all three elements of a version number.
Tracker Issues Fixed
Joomla! Bug Squad
Thanks to the Joomla Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla, please report it on the Joomla! CMS Issue Tracker.
Active members of the Joomla Bug Squad during the past three months include: Aaron Wood, Andrea Tarr, Bill Richardson, Brian Teeman, Christophe Demko, Dean Clarke, Dennis Hermacki, Elin Waring, Emerson Rocha Luiz, Harald Leithner, Itamar Elharar, Jacob Waisner, James Brice, Janich Rasmussen, Jean-Marie Simonet, Kevin Griffiths, Loyd Headrick, Marijke Stuivenberg, Marius van Rijnsoever, Mark Dexter, Matt Thomas, Michael Babker, Neil McNulty, Nicholas Dionysopoulos, Nick Savov, Nikolai Plath, Ofer Cohen, Peter Wiseman, rachmat wakjaer, Radek Suski, rob clayburn, Roland Dalmulder, Rouven Weßling, Rune Sjøen, Samuel Moffatt, Shaun Maunder, Soheil Novinfard, Troy Hall, Viet Vu.
Bug Squad Leadership: Mark Dexter, Coordinator.
Joomla! Security Strike Team
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla secure. Members include: Airton Torres, Alan Langford, Bill Richardson, Elin Waring, Gary Brooks, Jason Kendall, Jean-Marie Simonet, Jeremy Wilken, Marijke Stuivenberg, Mark Dexter, Michael Babker, Rouven Weßling, Samuel Moffatt.
How can you help Joomla development?
The great news is you don’t have to be a developer to help build Joomla. The Joomla Bug Squad is one of the most active teams in the Joomla development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla Wiki and, if you wish to join, email the Bug Squad coordinator.
You can also help Joomla development by thanking those involved in the many areas of the process.
The Joomla Project is pleased to announce the immediate availability of Joomla 3.0.3. This is a security release. The Production Leadership Team’s goal is to continue to provide regular, frequent updates to the Joomla community. Learn more about Joomla! development at the Developer Site.
Download
New Installations: Click here to download Joomla 3.0.3 (Full package) »
Update Package: Click here to download Joomla 3.0.2 to 3.0.3 (Update package) »
Update Package: Click here to download Joomla 3.0.3 (for updates from Joomla 2.5) (Update package) »
Note: If you are running version 3.0.0 please read the special update instructions before updating.
Instructions
Want to test drive Joomla? Try the online demo or the Joomla JumpBox. Documentation is available for beginners.
Please note that you should always backup your site before upgrading.
Release Notes
Check the Joomla 3.0.3 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
Statistics for the 3.0.3 release period
- Joomla 3.0.3 contains:
- 3 security issue fixed
- 2 new features
- 136 tracker issues fixed
Security Issues Fixed
- Low Priority – Core – Information Disclosure. More information »
- Low Priority – Core – Information Disclosure. More information »
- Low Priority – Core – Information Disclosure. More information »
New Features
- 29897 Multilanguage: adding items associations in remaining core components. Thanks Benjamin. Click here for more information.
- 29496 Language Installation tool for the Joomla Installer. Thanks Javier. Click here for more information.
Tracker Issues Fixed
Joomla! Bug Squad
Thanks to the Joomla Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla, please report it on the Joomla! CMS Issue Tracker.
Active members of the Joomla Bug Squad during the past three months include: Aaron Schmitz, Akarawuth Tamrareang, Aleksander Linkov, Andrea Tarr, Andrew Eddie, Angelika Reisiger, Brian Teeman, Constantin Romankiewicz, Cristina Solana, Daria Mikhailova, Dennis Hermacki, Elin Waring, Harald Leithner, Jacob Waisner, James Brice, Jan Kuchař, Janich Rasmussen, Jean-Marie Simonet, Jonathan M. Cameron, Kevin Griffiths, Lukas Polak, Mark Dexter, Mark Lee, Michael Babker, Milton Bryant, Moises Jafet Cornelio-Vargas, Nicholas Antimisiaris, Nicholas K. Dionysopoulos, Nick Savov, Nikolai Plath, Ofer Cohen, Omar Ramos, Peter van Westen, Peter Wiseman, Rob Clayburn, Roberto Segura, Roland Dalmulder, Soheil Novinfard, Tessa Mero, Troy Thomas Hall, Viet Hoang Vu.
Bug Squad Leadership: Mark Dexter, Coordinator. Super-star contributors and leaders by example: Jean-Marie Simonet and Elin Waring.
Joomla! Security Strike Team
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla secure. Members include: Airton Torres, Alan Langford, Bill Richardson, Elin Waring, Gary Brooks, Jason Kendall, Jean-Marie Simonet, Jeremy Wilken, Marijke Stuivenberg, Mark Boos, Mark Dexter, Michael Babker, Pushapraj Sharma, Rouven Weßling.
How can you help Joomla development?
The great news is you don’t have to be a developer to help build Joomla. The Joomla Bug Squad is one of the most active teams in the Joomla development process and is always looking for people (not just developers) that can help with sorting bug reports, coding patches and testing solutions. It’s a great way for increasing your working knowledge of Joomla, and also a great way to meet new people from all around the world.
If you are interested, please read about us on the Joomla Wiki and, if you wish to join, email the Bug Squad coordinator.
You can also help Joomla development by thanking those involved in the many areas of the process.
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
[-] Parallels Premium Outbound Antispam license could not be applied due to wrong product name
[-] Russian locale has been updated
Parallels Plesk Panel 9.5.4 MU#25 for Linux
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
[-] Parallels Autoinstaller has been updated to version 3.12.0
Parallels Plesk Panel 8.6.0 MU#19 for Linux
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
The following bug has been fixed:
[-] PCI compliance scanners are failing because Courier IMAP is not PCI compliant
[-] Parallels Premium Outbound Antispam license could not be applied due to wrong product name
[-] Russian locale has been updated
New version of Plesk Mirror Setup Tool 1.2 is uploaded to the article http://kb.parallels.com/113337
Synchronization of extensions/ directory for Linux versions of Plesk has been added.
Parallels Plesk Panel 8.6.0 MU#18 for Linux
The following bug has been fixed:
[-] Autoinstaller fails at microupdate installation with error “Unsupported item type: shell (line 244 column 9)”
Parallels Plesk Panel 8.6.0 MU#17 for Linux
The update delivers Major Security fixes on Linux.
It is recommended for all PP users and includes general functionality fixes that improve the stability, compatibility, and security of your PP server.
Parallels Plesk Panel 9.5.4 MU#24 for Linux
The update delivers Major Security fixes on Linux.
It is recommended for all PP users and includes general functionality fixes that improve the stability, compatibility, and security of your PP server.
Parallels Plesk Panel 9.5.5 MU#7 for Windows
The update delivers Major Security fixes on Windows.
It is recommended for all PP users and includes general functionality fixes that improve the stability, compatibility, and security of your PP server.
The update delivers Major Security fixes on Linux and Windows.
It is recommended for all PP users and includes general functionality fixes that improve the stability, compatibility, and security of your PP server.
The update delivers Major Security fixes on Linux and Windows.
It is recommended for all PP users and includes general functionality fixes that improve the stability, compatibility, and security of your PP server.