Ubuntu: 2046-1: Linux kernel (OMAP4) vulnerabilities
(Dec 3) Several security issues were fixed in the kernel.
(Dec 3) Several security issues were fixed in the kernel.
(Dec 3) Updated gimp packages that fix three security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
(Dec 3) An updated mod_nss package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More…]
We’re entering the quiet but busy part of a release, whittling down issues to bring you all of the new features you’re excited about with the stability you expect from WordPress. There are just a few days from the “code freeze” for our 3.8 release, which includes a number of exciting enhancements, so the focus is on identifying any major issues and resolving them as soon as possible.
If you’ve ever wondered about how to contribute to WordPress, here’s a time you can: download this release candidate and use it in as many ways as you can imagine. Try to break it, and if you do, let us know how you did it so we can make sure it never happens again. If you work for a web host, this is the release you should test as much as possible and start getting your automatic upgrade systems and 1-click installers ready.
Download WordPress 3.8 RC1 (zip) or use the WordPress Beta Tester plugin (you’ll want “bleeding edge nightlies”).
If you think you’ve found a bug, you can post to the Alpha/Beta area in the support forums. Or, if you’re comfortable writing a reproducible bug report, file one on the WordPress Trac. There, you can also find a list of known bugs and everything we’ve fixed so far.
We’re so close to the
finish line, jump in and help
good karma is yours.
(Dec 3) Several vulnerabilities have been discovered in OpenJPEG, a JPEG 2000 image library, that may lead to denial of service (CVE-2013-1447) via application crash or high memory consumption, possible code execution through heap buffer overflows (CVE-2013-6045), information disclosure [More…]
58 queries. 8.25 mb Memory usage. 0.526 seconds.