No Image

USN-3918-3: Firefox regression

2019-03-29 KENNETH 0

USN-3918-3: Firefox regression firefox regression A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary USN-3918-1 caused a regression in Firefox. Software Description firefox – Mozilla Open Source web browser Details USN-3918-1 fixed vulnerabilities in Firefox. The update caused web compatibility issues with some websites. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, denial of service via successive FTP authorization prompts or modal alerts, trick the user with confusing permission request prompts, obtain sensitive information, conduct social engineering attacks, or execute arbitrary code. (CVE-2019-9788, CVE-2019-9789, CVE-2019-9790, CVE-2019-9791, CVE-2019-9792, [ more… ]

No Image

USN-3925-1: FreeImage vulnerability

2019-03-29 KENNETH 0

USN-3925-1: FreeImage vulnerability freeimage vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary FreeImage could be made to crash or run programs as your login if it opened a specially crafted file. Software Description freeimage – Support library for graphics image formats (development files) Details It was discovered that an out-of-bounds write vulnerability existed in the XMP image handling functionality of the FreeImage library. If a user or automated system were tricked into opening a specially crafted image, a remote attacker could overwrite arbitrary memory, resulting in code execution. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS libfreeimage3 – 3.17.0+ds1-2ubuntu0.1 libfreeimageplus3 – 3.17.0+ds1-2ubuntu0.1 Ubuntu 14.04 LTS libfreeimage3 – 3.15.4-3ubuntu0.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In [ more… ]

[도서] 한 권으로 시작하는 소프트웨어

2019-03-29 KENNETH 0

[도서] 한 권으로 시작하는 소프트웨어 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]한 권으로 시작하는 소프트웨어 한옥영 저 | 사람의무늬 | 2019년 04월 판매가 16,000원 (0%할인) | YES포인트 0원(0%지급) 이 책은 어렵지 않고 흥미롭게 읽을 수 있도록 전문적인 지식을 깊이 다루고 있지 않다. 가벼운 마음으로 소프트웨어로 인해 변화하는 세상에 대한 상식을 알고자 한다면, 이 책을 적극 추천한다. 변화하는 세상을 Source: [도서] 한 권으로 시작하는 소프트웨어

No Image

USN-3924-1: mod_auth_mellon vulnerabilities

2019-03-28 KENNETH 0

USN-3924-1: mod_auth_mellon vulnerabilities libapache2-mod-auth-mellon vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.10 Ubuntu 18.04 LTS Summary Several security issues were fixed in mod_auth_mellon. Software Description libapache2-mod-auth-mellon – SAML 2.0 authentication module for Apache Details It was discovered that mod_auth_mellon incorrectly handled certain requests. An attacker could possibly use this issue to redirect a user to a malicious URL. (CVE-2019-3877) It was discovered that mod_auth_mellon incorrectly handled certain requests. An attacker could possibly use this issue to access sensitive information. (CVE-2019-3878) Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.10 libapache2-mod-auth-mellon – 0.14.0-1ubuntu0.1 Ubuntu 18.04 LTS libapache2-mod-auth-mellon – 0.13.1-1ubuntu0.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all the necessary changes. References CVE-2019-3877 CVE-2019-3878 Source: USN-3924-1: mod_auth_mellon [ more… ]

No Image

WordPress 5.2 Beta 1

2019-03-28 KENNETH 0

WordPress 5.2 Beta 1 WordPress 5.2 Beta 1 is now available! This software is still in development, so we don’t recommend you run it on a production site. Consider setting up a test site to play with the new version. You can test the WordPress 5.2 Beta two ways: Try the WordPress Beta Tester plugin (choose the “bleeding edge nightlies” option) Or download the beta here (zip). WordPress 5.2 is slated for release on April 30, and we need your help to get there. Here are some of the big items to test so we can find as many bugs as possible in the coming weeks. Block Editor The block editor has received significant performance improvements since WordPress 5.1, shaving 35% off the load time for massive posts, and cutting the keypress time (how responsive it feels when you’re typing) in half! Accessibility [ more… ]