No Image

USN-5244-1: DBus vulnerability

2022-01-21 KENNETH 0

USN-5244-1: DBus vulnerability Daniel Onaca discovered that DBus contained a use-after-free vulnerability, caused by the incorrect handling of usernames sharing the same UID. An attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. Source: USN-5244-1: DBus vulnerability

F5 and NGINX Together Extend Robust Security Across Your Hybrid Environment

2022-01-21 KENNETH 0

F5 and NGINX Together Extend Robust Security Across Your Hybrid Environment When one of the world’s most successful premium car makers picks an application security solution, you can be confident they’ve made sure it meets their standards for performance and reliability. That’s why we’re proud that the Audi Group – active in more than 100 markets worldwide – recently chose F5 NGINX App Protect WAF to secure its Kubernetes‑based platform for modern application development. NGINX App Protect is a prime example of how F5 enables customers on their digital transformation journeys by integrating its industry‑leading security expertise into tools for modern apps. In this case, we’ve ported the security engine from F5 Advanced Web Application Firewall (WAF) – tried and tested over decades by our BIG‑IP customers – into NGINX, known as an ideal platform for modern app delivery thanks to its exceptional performance, flexible [ more… ]

Getting started with Protocol Handlers for your web app

2022-01-21 KENNETH 0

Getting started with Protocol Handlers for your web app Beginning with Microsoft Edge 96, web apps can now use Protocol Handlers in Microsoft Edge. This is a powerful feature that allows your installed web application (or PWA) to handle pre-set or custom protocols. Installed web applications can now register with the operating system as protocol handlers and launch when a specific protocol is invoked. Let’s dive into the feature to understand how developers can take advantage of it. Typical use cases Probably the most common protocol that we interact with is the http protocol. When we click on a link that uses this protocol, the system knows to open the web browser and navigate to the address that is specified. Another typical protocol is mailto which allows users to click on email addresses and open the default e-mail client. There [ more… ]

No Image

USN-5243-2: AIDE vulnerability

2022-01-21 KENNETH 0

USN-5243-2: AIDE vulnerability USN-5243-1 fixed a vulnerability in aide. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: David Bouman discovered that AIDE incorrectly handled base64 operations. A local attacker could use this issue to cause AIDE to crash, resulting in a denial of service, or possibly execute arbitrary code. Source: USN-5243-2: AIDE vulnerability

No Image

USN-5243-1: AIDE vulnerability

2022-01-20 KENNETH 0

USN-5243-1: AIDE vulnerability David Bouman discovered that AIDE incorrectly handled base64 operations. A local attacker could use this issue to cause AIDE to crash, resulting in a denial of service, or possibly execute arbitrary code. Source: USN-5243-1: AIDE vulnerability