No Image

USN-4629-1: MoinMoin vulnerabilities

2020-11-11 KENNETH 0

USN-4629-1: MoinMoin vulnerabilities Michael Chapman discovered that MoinMoin incorrectly handled certain cache actions. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-25074) Catarina Leite discovered that MoinMoin incorrectly handled certain SVG files. An attacker could possibly use this issue to execute arbitrary code. (CVE-2020-15275) Source: USN-4629-1: MoinMoin vulnerabilities

No Image

USN-4628-1: Intel Microcode vulnerabilities

2020-11-11 KENNETH 0

USN-4628-1: Intel Microcode vulnerabilities Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit (RAPL) feature of some Intel processors allowed a side- channel attack based on power consumption measurements. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8695) Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly remove sensitive information before storage or transfer in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8696) Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly isolate shared resources in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8698) Source: USN-4628-1: Intel Microcode vulnerabilities

No Image

if(kakao)2020 코멘터리 02 : Klaytn, Caver, KAS 가 만들어가는 쉽고 빠른 BApp 개발 환경

2020-11-11 KENNETH 0

if(kakao)2020 코멘터리 02 : Klaytn, Caver, KAS 가 만들어가는 쉽고 빠른 BApp 개발 환경 안녕하세요, Ground X의 Platform Development Team입니다. Ground X의 블록체인 플랫폼 Klaytn, 그리고 Klaytn을 쉽게 쓰기 위한 API Service (KAS)와 SDK (caver)를 개발하고 있습니다. 이번 if(Kakao)2020에서는 Klaytn의 성능 및 비용 개선을 위해 노력한 경험, caver의 사용성 개선을 위해 노력한 경험, KAS의 reference BApp을 개발한 경험, 그리고 Ground X에서의 devops에 대해 들려드릴 예정인데요, 이번 글을 통해 먼저 […] Source: if(kakao)2020 코멘터리 02 : Klaytn, Caver, KAS 가 만들어가는 쉽고 빠른 BApp 개발 환경

No Image

USN-4627-1: Linux kernel vulnerability

2020-11-11 KENNETH 0

USN-4627-1: Linux kernel vulnerability Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit (RAPL) driver in the Linux kernel did not properly restrict access to power data. A local attacker could possibly use this to expose sensitive information. Source: USN-4627-1: Linux kernel vulnerability

No Image

USN-4626-1: Linux kernel vulnerabilities

2020-11-11 KENNETH 0

USN-4626-1: Linux kernel vulnerabilities Simon Scannell discovered that the bpf verifier in the Linux kernel did not properly calculate register bounds for certain operations. A local attacker could use this to expose sensitive information (kernel memory) or gain administrative privileges. (CVE-2020-27194) Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit (RAPL) driver in the Linux kernel did not properly restrict access to power data. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8694) Source: USN-4626-1: Linux kernel vulnerabilities