Ubuntu: 2015-1: Linux kernel vulnerabilities
(Nov 8) Several security issues were fixed in the kernel.
(Nov 8) Several security issues were fixed in the kernel.
(Nov 8) Several security issues were fixed in the kernel.
(Nov 8) Several security issues were fixed in the kernel.
(Nov 8) Several security issues were fixed in the kernel.
(Nov 8) Several security issues were fixed in the kernel.
(Nov 5) Updated java-1.6.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More…]
(Nov 7) Updated java-1.5.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having [More…]
(Nov 6) Light Display Manager could be made to expose sensitive informationlocally.
(Nov 7) Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More…]
(Nov 7) Updated java-1.7.0-ibm packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More…]
Inadequate filtering leads to XSS vulnerability in com_contact.
Joomla! version 2.5.14 and earlier 2.5.x versions; and version 3.1.5 and earlier 3.0.x versions.
Upgrade to version 2.5.16, 3.1.6 or 3.2.
The JSST at the Joomla! Security Center.
The following functionalities were improved:
The following issue was resolved:
[-] File manager could not open files for viewing if these files contained umlauts or symbols encoded in CP1251. (PPPM-942)
The Joomla Project is pleased to announce the immediate availability of Joomla 2.5.16. 2.5.16 addresses three critical issues reported after the release of 2.5.15 earlier today. Aside from the links to the download packages, the text of the rest of this article is the same as that of today’s 2.5.15 release.
For users on 2.5.15 who are unable to update to 2.5.16 via the core update component, please download the patch package from http://joomlacode.org/gf/download/frsrelease/18859/91475/Joomla_2.5.15_to_2.5.16-Stable-Patch_Package.zip and install it via your Extension Manager to update.
This is a security release addressing three security issues. The Production Leadership Team’s goal is to continue to provide regular, frequent updates to the Joomla community. Learn more about Joomla! development at the Developer Site.
The update process is very simple, and complete instructions are available here. Note that there are now easier and better ways of updating than copying the files with FTP.
Note: Please read the update instructions before updating.
*Please clear your browser’s cache after ugprading
Want to test drive Joomla? Try the online demo or the Joomla JumpBox. Documentation is available for beginners.
Check the Joomla 2.5.15 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
See http://developer.joomla.org/version-2-5-15-release-notes.html for details of the tracker items fixed.
Thanks to the Joomla Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla, please report it on the Joomla! CMS Issue Tracker.
Active members of the Joomla Bug Squad during past 3 months include: Achal Aggarwal, Adelene Teh, Aleksander Linkov, Angelika Reisiger, Anibal Sanchez, Anja Hage, Artur Alves, Ashan Fernando, Beat , Brian Teeman, Chad Windnagle, Constantin Romankiewicz, Daniel Kanchev, David Hurley, Dennis Hermacki, Dimitar Genchev, Duong Nguyen, Edwin Cheront, Elin Waring, George Wilson, Gunjan Patel, Hans Kuijpers, Hervé Boinnard, Hugh Messenger, Janich Rasmussen, Jason Rey, Jérôme GLATIGNY, Jean-Marie Simonet, Jern Wei Tan, Jerri Christiansen, Jozsef Tamas Herczeg, Khai Vu Dinh, klas 10, landor landor, Lao Neo, Lara Petersen, Le Van Thuyet, Loc Le Minh, Lu Nguyen, Marc Antoine Thevenet, Marijke Stuivenberg, Mario Proenca, Mark Dexter, Mark Lee, Matias Aguirre, Michael Babker, Mihail Irintchev, Mike Biolsi, Mike Veeckmans, Nha Bui, Nicholas Dionysopoulos, Nick Savov, Nik Faris Akmal, Ofer Cohen, Olaf Offick, Patrick Alt, Peter Martin, Peter van Westen, Peter Wiseman, Piotr Konieczny, Radek Suski, Richard McDaniel, Rob de Cleen, Robert Deutz, Robert Gastaud, Roberto Segura, Roland Dalmulder, Ronni Christiansen, Sam Teh, Sander Potjer, Sandra Thevenet, Sebastian Łuckoś, Sergio Iglesias, Seth Warburton, Shafiq Mazlan, Stefania Gaianigo, Thomas Hunziker, Tino Brackebusch, TJ Baker, Tobias Zulauf, tompap tompap, Troy Hall, Tu Diep The, Valentin Despa, Victor Drover, Viliam Kubis, Yiliang Yang.
Bug Squad Leadership: Mark Dexter and Nick Savov, Co-Coordinators.
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla secure. Members include: Airton Torres, Alan Langford, Beat, Bill Richardson, David Hurley, Don Gilbert, Elin Waring, Gary Brooks, Jason Kendall, Jean-Marie Simonet, Marijke Stuivenberg, Mark Boos, Mark Dexter, Matias Griese, Michael Babker, Nick Savov, Pushapraj Sharma, Rouven Weßling.
The Joomla Project is pleased to announce the immediate availability of Joomla 2.5.15. This is a security release addressing three security issues. The Production Leadership Team’s goal is to continue to provide regular, frequent updates to the Joomla community. Learn more about Joomla! development at the Developer Site.
The update process is very simple, and complete instructions are available here. Note that there are now easier and better ways of updating than copying the files with FTP.
Note: Please read the update instructions before updating.
*Please clear your browser’s cache after ugprading
Want to test drive Joomla? Try the online demo. Documentation is available for beginners.
Check the Joomla 2.5.15 Post-Release FAQs to see if there are important items and helpful hints discovered after the release.
See http://developer.joomla.org/version-2-5-15-release-notes.html for details of the tracker items fixed.
Thanks to the Joomla Bug Squad for their dedicated efforts investigating reports, fixing problems, and applying patches to Joomla. If you find a bug in Joomla, please report it on the Joomla! CMS Issue Tracker.
Active members of the Joomla Bug Squad during past 3 months include: Achal Aggarwal, Adelene Teh, Aleksander Linkov, Angelika Reisiger, Anibal Sanchez, Anja Hage, Artur Alves, Ashan Fernando, Beat , Brian Teeman, Chad Windnagle, Constantin Romankiewicz, Daniel Kanchev, David Hurley, Dennis Hermacki, Dimitar Genchev, Duong Nguyen, Edwin Cheront, Elin Waring, George Wilson, Gunjan Patel, Hans Kuijpers, Hervé Boinnard, Hugh Messenger, Janich Rasmussen, Jason Rey, Jérôme GLATIGNY, Jean-Marie Simonet, Jern Wei Tan, Jerri Christiansen, Jozsef Tamas Herczeg, Khai Vu Dinh, klas 10, landor landor, Lao Neo, Lara Petersen, Le Van Thuyet, Loc Le Minh, Lu Nguyen, Marc Antoine Thevenet, Marijke Stuivenberg, Mario Proenca, Mark Dexter, Mark Lee, Matias Aguirre, Michael Babker, Mihail Irintchev, Mike Biolsi, Mike Veeckmans, Nha Bui, Nicholas Dionysopoulos, Nick Savov, Nik Faris Akmal, Ofer Cohen, Olaf Offick, Patrick Alt, Peter Martin, Peter van Westen, Peter Wiseman, Piotr Konieczny, Radek Suski, Richard McDaniel, Rob de Cleen, Robert Deutz, Robert Gastaud, Roberto Segura, Roland Dalmulder, Ronni Christiansen, Sam Teh, Sander Potjer, Sandra Thevenet, Sebastian Łuckoś, Sergio Iglesias, Seth Warburton, Shafiq Mazlan, Stefania Gaianigo, Thomas Hunziker, Tino Brackebusch, TJ Baker, Tobias Zulauf, tompap tompap, Troy Hall, Tu Diep The, Valentin Despa, Victor Drover, Viliam Kubis, Yiliang Yang.
Bug Squad Leadership: Mark Dexter and Nick Savov, Co-Coordinators.
A big thanks to the Joomla! Security Strike Team for their ongoing work to keep Joomla secure. Members include: Airton Torres, Alan Langford, Beat, Bill Richardson, David Hurley, Don Gilbert, Elin Waring, Gary Brooks, Jason Kendall, Jean-Marie Simonet, Marijke Stuivenberg, Mark Boos, Mark Dexter, Matias Griese, Michael Babker, Nick Savov, Pushapraj Sharma, Rouven Weßling.
Inadequate filtering leads to XSS vulnerability in com_contact, com_weblinks, com_newsfeeds.
Joomla! version 2.5.14 and earlier 2.5.x versions; and version 3.1.5 and earlier 3.0.x versions.
Upgrade to version 2.5.15, 3.1.6 or 3.2.
The JSST at the Joomla! Security Center.
Inadequate filtering leads to XSS vulnerability in com_contact.
Joomla! version 2.5.14 and earlier 2.5.x versions; and version 3.1.5 and earlier 3.0.x versions.
Upgrade to version 2.5.15, 3.1.6 or 3.2.
The JSST at the Joomla! Security Center.
The Joomla! Project and Community is excited and proud to announce the immediate availability of Joomla! CMS 3.2.0 Stable.
With literally dozens of new features including:
Joomla 3.2 is truly a Something New for Everyone release. These exciting new features are highlighted and explained in a series of short video preview tutorials: Joomla! 3.2 Video Tutorials.
(Nov 4) Libav could be made to crash or run programs as your login if it opened aspecially crafted file.
(Nov 4) Multiple vulnerabilities were discovered in the dissectors for IEEE 802.15.4, NBAP, SIP and TCP, which could result in denial of service. The oldstable distribution (squeeze) is only affected by CVE-2013-6340. [More…]
(Nov 4) Updated gc packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
11/5/2013 Houston, TX – cPanel, Inc. is thrilled to release cPanel & WHM software version 11.40, which is now available in the RELEASE tier. cPanel & WHM version 11.40 offers support for IPv6 and 1:1 NAT, an API Shell, and more. IPv6 Support cPanel & WHM is now IPv6-enabled with …
(Nov 4) Cedric Krier discovered that the Tryton client does not sanitize the file extension supplied by the server when processing reports. As a result, a malicious server could send a report with a crafted file extension that causes the client to write any local file to which the [More…]
(Nov 2) A flaw was found in the way the Mozilla Network Security Service library (nss) read uninitialized data when there was a decryption failure. A remote attacker could use this flaw to cause a denial of service (application crash) for applications linked with the nss library. [More…]
The November issue of the Joomla Community Magazine is here! Our stories this month:
Join us at #JWC13!, by Dianne Henning
Joomla! Fan Art Logo Contest – We have a Winner!, by Dianne Henning
The Power of Twitter, by John Rampton
Joomla Could Be the Next “Killer App” for Professional Writers, by Matt Majeske
Distributions – When One Flavour is Not Enough, by Andrew Eddie
Leadership Highlights – November 2013, by Alice Grevet
Introducing the ‘Client’ Template, by Randy Carey
Explaining Joomla! for Non-Techies (Part I), by Pedro F. Vidal Lopez
JLayout Improvements for Joomla! 3.2, by Roberto Segura
Demand Their Best, by Ed Hathaway
EasyBlog: Fast, Nice & Easy, by Mike Veeckmans
JoomlaDay Johannesburg – South Africa, by Jacques Rentzke
JoomlaDay Houston had the X Factor!, by Dianne Henning
Report on JoomlaDay San Francisco, by Jennifer Gress
Roundup from JUG Corner – October 2013, by Ruth Cheesley
Insight to Module Modernization, by Lasindu Charith
New MVC for Joomla! CMS, by Buddhima Wijeweera
Browse the international articles submitted this month.
We want to publish your Joomla! story in the next JCM issue! So take a look at our Author Resources content to get a better idea of what we are looking for, and then register to become a JCM author and submit your Joomla! story!
(Oct 29) An updated spice-server package that fixes one security issue is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having [More…]
(Oct 29) Updated qspice packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having [More…]
(Oct 29) Updated postgresql and postgresql84 packages that fix two security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
(Oct 29) Updated firefox packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having critical [More…]
(Oct 29) Firefox could be made to crash or run programs as your login if itopened a malicious website.
(Oct 31) Several security issues were fixed in Thunderbird.
58 queries. 9 mb Memory usage. 0.833 seconds.