Disabled zoom for apps that do not fit HiDPI; Fixed the problem that the newly installed application does not appear in the launcher under special circumstances; Optimized for small memory; Updated flatpak runtime to remove the lines in HiDPI ; Fixed the problem that TIM reported “It has been tampered with by a third party”.
Updated Qt to version 5.6.1 Fixed the black side issue of window problem caused by plugins; Solved the issue of HiDPI thin line. Update TIM to version 2.0.0 Solve the issue that online document can not be opened; The system default browser is used to open an online document. Update Deepin Calculator to version 1.0.1 Specific font is used in historical expression list; Optimized the calculation accuracy. Applications updated and added in Deepin Appstore
Deepin Emacs Updated to Version 3.0-1 Added real-time format to indent by syntax when writing codes; Added dired-filter mode to quickly filter and display files according to rules under dired; emacs 27.0.50 of the newest emacs git is used to build; Disabled temporary scratch buffer on starting; Added buffer protection to minibuffer-tray, avoiding to exit minibuffer-tray progress when deleting buffer; Added upper case characters and bound to Alt + z; Migrate multi-term.el plugin to cl-lib repository; Added key bindings for moccur-grep-find-pwd; Fast recursively find words at the cursor and select strings; Added Intelligent indent function for paredit-open-curly-smart; Updated move-text.el plug-in to be compatible with versions later than Emacs 26; Improved C++ syntax highlight; Supported Rust language; Detected g++ command before loading the plugin of auto-complete-clang-extension.el to …Read more
Fixed System and Application Bugs Cofigurated debconf as a graphical user interface to support some needed interactions in Control Center and Deepin Store; Updated the printer driver; Deepin Voice Recorder updated to Version 2.6.1, fixed the issue that files recorded in mp4 can not be played in phone player and WeChat; Fixed the issue that Baidu Netdisk can not start after updated;
The security updates of wpa. Vulnerability Information DSA-3999-1 wpa —Security Updates Security database details: Mathy Vanhoef of the imec-DistriNet research group of KU Leuven discovered multiple vulnerabilities in the WPA protocol, used for authentication in wireless networks. Those vulnerabilities applies to both the access point (implemented in hostapd) and the station (implemented in wpa_supplicant). An attacker exploiting the vulnerabilities could force the vulnerable system to reuse cryptographic session keys, enabling a range of cryptographic attacks against the ciphers used in WPA1 and WPA2. More information can be found in the researchers’s paper, Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. CVE-2017-13077: …Read more
Fixed System and Application Bugs Updated Policykit, fixed the issue that environment variable was invalid; Packed WeChat for Enterprise and fixed the issue of minimization; Fixed and updated Qianniu Work; Added and updated applications in Deepin Store;
The security updates of systemd and linux kernal. Vulnerability Information CVE-2017-12134 —Security Updates Security database details: The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation. CVE-2017-12153 —Security Updates Security database details: A security flaw was discovered in the nl80211_set_rekey_data() function in net/wireless/nl80211.c in the Linux kernel through 4.13.3. This function does not check whether the required attributes are present in a Netlink request. This request can be issued by …Read more
Armis Labs revealed a new attack vector endangering major mobile, desktop, and IoT operating systems, including Android, iOS, Windows, and Linux, and the devices using them. The new vector is dubbed “BlueBorne”, as it spread through the air (airborne) and attacks devices via Bluetooth. Armis has also disclosed eight related zero-day vulnerabilities, four of which are classified as critical. BlueBorne allows attackers to take control of devices, access corporate data and networks, penetrate secure “air-gapped” networks, and spread malware laterally to adjacent devices. Armis reported these vulnerabilities to the responsible actors, and is working with them as patches are being …Read more