No Image

입사 후 6개월 동안 달라진 것들 – 2020 신입 온보딩 과정 그 후의 이야기

2020-09-02 KENNETH 0

입사 후 6개월 동안 달라진 것들 – 2020 신입 온보딩 과정 그 후의 이야기 지난 3월, 카카오 개발자로서 첫 걸음을 떼던 Albus, David, Tate 세 분을 만나 두 달간의 신입 개발자 온보딩 과정에 대해 진솔한 이야기를 나누는 자리가 있었습니다. (두 달 간의 신입 개발자 온보딩 과정을 돌아보며 – 신입 개발자들과의 인터뷰) 부서로 갓 배정된 시점에 코로나(COVID-19)로 인해 전사 원격근무를 하게 되어 당시 인터뷰도 화상으로 만나 보았는데요, 현재는 on-site 근무로 […] Source: 입사 후 6개월 동안 달라진 것들 – 2020 신입 온보딩 과정 그 후의 이야기

No Image

USN-4483-1: Linux kernel vulnerabilities

2020-09-02 KENNETH 0

USN-4483-1: Linux kernel vulnerabilities Chuhong Yuan discovered that go7007 USB audio device driver in the Linux kernel did not properly deallocate memory in some failure conditions. A physically proximate attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-20810) Fan Yang discovered that the mremap implementation in the Linux kernel did not properly handle DAX Huge Pages. A local attacker with access to DAX storage could use this to gain administrative privileges. (CVE-2020-10757) It was discovered that the Linux kernel did not correctly apply Speculative Store Bypass Disable (SSBD) mitigations in certain situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10766) It was discovered that the Linux kernel did not correctly apply Indirect Branch Predictor Barrier (IBPB) mitigations in certain situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-10767) [ more… ]

Why DNS Is Critical for Modern Application Deployments

2020-09-02 KENNETH 0

Why DNS Is Critical for Modern Application Deployments In a previous blog, I explained how application outages can impact customer confidence and bring your business to a standstill. In today’s marketplace, failing to adapt and deliver new services to the market quickly can be just as harmful. With the rise of DevOps and improvements to the tooling that supports continuous integration and continuous delivery (CI/CD), companies can improve their ability to deploy and ship code with excellent results. But in rolling out new updates, they still want to mitigate their risk of a bad deployment, minimizing the chance of downtime for their customers. This blog post explores different deployment strategies DevOps and NetOps teams can use to seamlessly and safely deploy updates to production, and explains how DNS can work with specific deployment models. Blue-Green Deployments Blue-green deployments are a [ more… ]

No Image

USN-4482-1: Ark vulnerability

2020-09-02 KENNETH 0

USN-4482-1: Ark vulnerability Fabian Vogt discovered that Ark incorrectly handled symbolic links in tar archive files. An attacker could use this to construct a malicious tar archive that, when opened, would create files outside the extraction directory. Source: USN-4482-1: Ark vulnerability