Anzeigen der neuesten Beiträge
0 Mitglieder und 7 Gäste betrachten dieses Thema.
QML UI (MeeGo 1.2 Harmattan on the N950 and N9) Check for new episodes via "Pull down to refresh" Subscribe to new podcast list is now a QML Sheet Open show note links in browser (bug 1556) Fix back button behavior (bug 1677) New episode list model (speeds up scrolling) Various smaller clean-ups and UI improvementsGtk UI Fix wrong artwork in podcast settings (bug 1675) Don't auto-update when offline (bug 107) Import titles from OPML / directory (bug 1711) Integrate shownotes into main window Don't require Gtk+ 2.24 in .ui fileWeb UI Various improvements to the interface (pull request 17)Command-line interface (gpo) Align safe_print() with Python 3's print() (bug 1697) Added experimental pipe-based IPC interface ("gpo pipe")YouTube Fix the new 403 issue (bug 1665) Gtk UI for video quality selection (pull request 19) Add support for https:// links Remove dependency on OrderedDict Fix downloading on HarmattanExtensions Improvements to the extension system New extension: update_feeds_on_startup (bug 1656) New extension: Enqueue in media player (bug 1583) Updated: TED Talks Subtitle Downloader Extension Groups and submenus in episode list context menu Add disable_in=win32 to a few extensions (bug 1729)Clean-ups and refactoring Remove old api.py module Remove podcast_id accessor functions (bug 1696) Don't warn about system files on Windows (bug 1712) Handle mygpoclient's MissingCredentials exception Util: Python 2.6 compatibility fix Vacuum minidb-based databases too (bug 1721) gpodder.util: Use gpodder.ui.win32 for new codeFlattr integration Reload when pressing play in the shownotes (bug 1684) Use util.sanitize_encoding for the flattr payment-url Add Flattr option to the episode context menuNetwork connectivity detection Basic Offline mode support (bug 107) Offline mode detection for OS X (bug 107) Linux: Detect PPP as Internet connection (bug 1702)Other changes Download strategy: Only keep latest (bug 188) Download: Rate-limiting for progress updates Device sync: Per-podcast sync option (pull request 22) Updated translations from source (+German translation) Vimeo: Fix downloading of Vimeo videos
Stinger Release NotesBuild Number: 10.2.0.950Build Date: 10-Jan-2013Stinger 32bit MD5: DBB334071CD46CE066512C3A581C1CB6 SHA1: 873DBC24545F1EEAEB2B18ED4B435AE499430AA6Stinger ePO 32bit MD5: b1b762de5f72917ea47fd64bdb414e25 SHA1: 7265c1cf09d7010a3c48fe4c531d9c42fd48d27dEnhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.New Detections:• Generic.ha• Keylog-SFY.drEnhanced Detections:• BackDoor-FHI• Exploit-CVE2012-0507• FakeAlert-SecurityTool.gv• Generic Downloader.hl• Generic Downloader.z• Generic FakeAlert• JS/Exploit-Blacole• JS/Exploit-Blacole.eu• JS/Exploit-Blacole.gc• JS/Exploit-Blacole.gq• JS/Exploit-Blacole.ht• PWS-Zbot.gen.arw• PWS-Zbot.gen.atz• Vundo• Vundo.gen.hn• Vundo.gen.ho• Vundo.gen.hp• W32/Autorun.worm.aaeb• W32/Autorun.worm.aaeh• W32/Autorun.worm.c• W32/Autorun.worm.h• W32/Rimecud• W32/Rimecud.gen.dp• ZeroAccess!cfg
The Chrome team is excited to announce the promotion of Chrome 24 to the stable channel. Chrome 24.0.1312.52 has been updated for Windows, Mac, Linux, and Chrome Frame.This is the first Stable release with support for MathML, thanks to WebKit volunteer Dave Barton. This release also contains an update to Flash (11.5.31.137) as well as improvements in speed and stability. You can find out more about Chrome 24 on the Official Chrome Blog and the Official Chromium Blog.Security fixes and rewards:Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix. [$1000] [162494] High CVE-2012-5145: Use-after-free in SVG layout. Credit to Atte Kettunen of OUSPG. [$4000] [165622] High CVE-2012-5146: Same origin policy bypass with malformed URL. Credit to Erling A Ellingsen and Subodh Iyenger, both of Facebook. [$1000] [165864] High CVE-2012-5147: Use-after-free in DOM handling. Credit to José A. Vázquez. [167122] Medium CVE-2012-5148: Missing filename sanitization in hyphenation support. Credit to Google Chrome Security Team (Justin Schuh). [166795] High CVE-2012-5149: Integer overflow in audio IPC handling. Credit to Google Chrome Security Team (Chris Evans). [165601] High CVE-2012-5150: Use-after-free when seeking video. Credit to Google Chrome Security Team (Inferno). [165538] High CVE-2012-5151: Integer overflow in PDF JavaScript. Credit to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google Security Team. [165430] Medium CVE-2012-5152: Out-of-bounds read when seeking video. Credit to Google Chrome Security Team (Inferno). [164565] High CVE-2012-5153: Out-of-bounds stack access in v8. Credit to Andreas Rossberg of the Chromium development community. [Windows only] [164490] Low CVE-2012-5154: Integer overflow in shared memory allocation. Credit to Google Chrome Security Team (Chris Evans). [Mac only] [163208] Medium CVE-2012-5155: Missing Mac sandbox for worker processes. Credit to Google Chrome Security Team (Julien Tinnes). [162778] High CVE-2012-5156: Use-after-free in PDF fields. Credit to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google Security Team. [162776] [162156] Medium CVE-2012-5157: Out-of-bounds reads in PDF image handling. Credit to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google Security Team. [162153] High CVE-2013-0828: Bad cast in PDF root handling. Credit to Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google Security Team. [162114] High CVE-2013-0829: Corruption of database metadata leading to incorrect file access. Credit to Google Chrome Security Team (Jüri Aedla). [Windows only] [162066] Low CVE-2013-0830: Missing NUL termination in IPC. Credit to Google Chrome Security Team (Justin Schuh). [161836] Low CVE-2013-0831: Possible path traversal from extension process. Credit to Google Chrome Security Team (Tom Sepez). [160380] Medium CVE-2013-0832: Use-after-free with printing. Credit to Google Chrome Security Team (Cris Neckar). [154485] Medium CVE-2013-0833: Out-of-bounds read with printing. Credit to Google Chrome Security Team (Cris Neckar). [154283] Medium CVE-2013-0834: Out-of-bounds read with glyph handling. Credit to Google Chrome Security Team (Cris Neckar). [152921] Low CVE-2013-0835: Browser crash with geolocation. Credit to Arthur Gerkis. [150545] High CVE-2013-0836: Crash in v8 garbage collection. Credit to Google Chrome Security Team (Cris Neckar). [145363] Medium CVE-2013-0837: Crash in extension tab handling. Credit to Tom Nielsen. [Linux only] [143859] Low CVE-2013-0838: Tighten permissions on shared memory segments. Credit to Google Chrome Security Team (Chris Palmer).