No Image

USN-5046-1: Linux kernel vulnerabilities

2021-08-18 KENNETH 0

USN-5046-1: Linux kernel vulnerabilities It was discovered that the bluetooth subsystem in the Linux kernel did not properly perform access control. An authenticated attacker could possibly use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129) Michael Brown discovered that the Xen netback driver in the Linux kernel did not properly handle malformed packets from a network PV frontend, leading to a use-after-free vulnerability. An attacker in a guest VM could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-28691) It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device initialization failure, leading to a double-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3564) It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI [ more… ]

No Image

USN-5044-1: Linux kernel vulnerabilities

2021-08-18 KENNETH 0

USN-5044-1: Linux kernel vulnerabilities It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device initialization failure, leading to a double-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3564) It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device detach events, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3573) It was discovered that the NFC implementation in the Linux kernel did not properly handle failed connect events leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service. (CVE-2021-3587) Source: USN-5044-1: Linux kernel vulnerabilities

No Image

USN-5045-1: Linux kernel vulnerabilities

2021-08-18 KENNETH 0

USN-5045-1: Linux kernel vulnerabilities Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol implementation in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-34693) It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device initialization failure, leading to a double-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3564) It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device detach events, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3573) It was discovered that the NFC implementation in the Linux kernel did not properly handle failed connect events [ more… ]

[도서] 데이터는 어떻게 자산이 되는가?

2021-08-18 KENNETH 0

[도서] 데이터는 어떻게 자산이 되는가? 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]데이터는 어떻게 자산이 되는가? 김옥기 저 | 이지스퍼블리싱 | 2021년 08월 판매가 16,200원 (10%할인) | YES포인트 900원(5%지급) 데이터는 4차 산업혁명의 원동력으로서 경제·사회·기술 전반에 걸쳐 커다란 변혁을 일으키고 있다. 이미 데이터 자본 시대의 성숙 단계에 진입한 글로벌 기업들의 앞선 기술과 데이터를 기반으로 새로운 수익 모델 Source: [도서] 데이터는 어떻게 자산이 되는가?

[도서] 문제부터 풀자! C Programming

2021-08-18 KENNETH 0

[도서] 문제부터 풀자! C Programming 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]문제부터 풀자! C Programming 김광 저 | 북스홀릭퍼블리싱 | 2021년 09월 판매가 20,000원 (0%할인) | YES포인트 0원(0%지급) 이 책은 컴퓨터 프로그래밍을 배우는 데에 있어서 기초가 되는 논리들을 이해하고, 이를 활용하여 문제를 풀어가면서 프로그램 제작 훈련을 돕기 위해 만들어진 책이다. 이 훈련의 특징은 프로그래밍의 기초부터 응 Source: [도서] 문제부터 풀자! C Programming