No Image

USN-4594-1: Quassel vulnerabilities

2020-10-21 KENNETH 0

USN-4594-1: Quassel vulnerabilities It was discovered that Quassel incorrectly handled Qdatastream protocol. A remote attacker could possibly use this issue to execute arbitrary code. (CVE-2018-1000178) It was discovered that Quassel incorrectly handled certain login requests. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2018-1000179) Source: USN-4594-1: Quassel vulnerabilities

No Image

Introducing Microsoft Edge preview builds for Linux

2020-10-21 KENNETH 0

Introducing Microsoft Edge preview builds for Linux We are pleased to announce the availability of the Microsoft Edge Dev Channel for Linux! With this release, Microsoft Edge is now available for all major desktop and mobile platforms. We’re particularly excited to offer web developers the same consistent and powerful web platform and developer tools as on macOS or Windows, so you can build and test in your preferred environment and be confident in the experience your customers will have on other devices. For security researchers, we’re now also accepting submissions for the Microsoft Edge Bounty Program on Linux. Today’s release supports Ubuntu, Debian, Fedora, and openSUSE distributions. Going forward, we plan to release weekly builds following our typical Dev Channel cadence alongside our other supported platforms. In this post, we’ll walk you through how to install Microsoft Edge on your [ more… ]

What’s new in the Windows 10 October 2020 Update

2020-10-21 KENNETH 0

What’s new in the Windows 10 October 2020 Update The Windows 10 October 2020 Update has started to become available to customers as a free update. This year has continued to bring about change for many of us. Change in how we connect to one another, how we work, how we learn, even how we have fun. And that change is starting to feel more permanent, especially with kids going back to school adapting to remote learning and connection with their teachers and classmates or workplaces shifting to hybrid environments. Throughout all of this, the PC has become the essential device to keep us connected across our lives; it’s become our office, our classroom, even our playground. As we all adapt, live and learn through this together, one constant that remains is our commitment to you, our customers. We know [ more… ]

No Image

How to get the Windows 10 October 2020 Update

2020-10-21 KENNETH 0

How to get the Windows 10 October 2020 Update With organizations moving and adapting from remote to hybrid work scenarios, and essential workers continuing to support us all, it is more important than ever that we continue to provide you with the tools you need to remain protected and productive. In June, we announced Windows 10, version 20H2—and the availability of the first preview build in the Windows Insider Program. We then released a preview build to commercial customers in the Beta and Release Preview Channels for pre-release validation in August. We have continued to make improvements based on the feedback received through these programs and I am pleased to announce that we are beginning the availability of the October 2020 Update. Today’s post offers details on our measured and phased roll out approach, how you can get the update, [ more… ]

No Image

USN-4587-1: iTALC vulnerabilities

2020-10-21 KENNETH 0

USN-4587-1: iTALC vulnerabilities Nicolas Ruff discovered that iTALC had buffer overflows, divide-by-zero errors and didn’t check malloc return values. A remote attacker could use these issues to cause a denial of service or possibly execute arbitrary code. (CVE-2014-6051, CVE-2014-6052, CVE-2014-6053, CVE-2014-6054, CVE-2014-6055) Josef Gajdusek discovered that iTALC had heap-based buffer overflow vulnerabilities. A remote attacker could used these issues to cause a denial of service or possibly execute arbitrary code. (CVE-2016-9941, CVE-2016-9942) It was discovered that iTALC had an out-of-bounds write, multiple heap out-of-bounds writes, an infinite loop, improper initializations, and null pointer vulnerabilities. A remote attacker could used these issues to cause a denial of service or possibly execute arbitrary code. (CVE-2018-15127, CVE-2018-20019, CVE-2018-20020, CVE-2018-20021, CVE-2018-20022, CVE-2018-20023, CVE-2018-20024, CVE-2018-20748, CVE-2018-20749, CVE-2018-20750, CVE-2018-7225, CVE-2019-15681) Source: USN-4587-1: iTALC vulnerabilities