No Image

USN-5936-1: Samba vulnerabilities

2023-03-08 KENNETH 0

USN-5936-1: Samba vulnerabilities Evgeny Legerov discovered that Samba incorrectly handled buffers in certain GSSAPI routines of Heimdal. A remote attacker could possibly use this issue to cause Samba to crash, resulting in a denial of service. (CVE-2022-3437) Tom Tervoort discovered that Samba incorrectly used weak rc4-hmac Kerberos keys. A remote attacker could possibly use this issue to elevate privileges. (CVE-2022-37966, CVE-2022-37967) It was discovered that Samba supported weak RC4/HMAC-MD5 in NetLogon Secure Channel. A remote attacker could possibly use this issue to elevate privileges. (CVE-2022-38023) Greg Hudson discovered that Samba incorrectly handled PAC parsing. On 32-bit systems, a remote attacker could use this issue to escalate privileges, or possibly execute arbitrary code. (CVE-2022-42898) Joseph Sutton discovered that Samba could be forced to issue rc4-hmac encrypted Kerberos tickets. A remote attacker could possibly use this issue to escalate privileges. This issue [ more… ]

No Image

USN-5935-1: Linux kernel vulnerabilities

2023-03-08 KENNETH 0

USN-5935-1: Linux kernel vulnerabilities It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-0461) Davide Ornaghi discovered that the netfilter subsystem in the Linux kernel did not properly handle VLAN headers in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-0179) It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3169) Maxim Levitsky discovered that the KVM nested virtualization (SVM) implementation [ more… ]

No Image

USN-5934-1: Linux kernel (Raspberry Pi) vulnerabilities

2023-03-08 KENNETH 0

USN-5934-1: Linux kernel (Raspberry Pi) vulnerabilities It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain protocols, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-0461) It was discovered that the NVMe driver in the Linux kernel did not properly handle reset events in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3169) It was discovered that a use-after-free vulnerability existed in the SGI GRU driver in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-3424) Gwangun Jung discovered a race condition in the IPv4 implementation [ more… ]

AWS 주간 소식 모음 — 말레이시아 리전 예고 및 연구용 Amazon Lightsail 출시 등

2023-03-08 KENNETH 0

AWS 주간 소식 모음 — 말레이시아 리전 예고 및 연구용 Amazon Lightsail 출시 등 한 주 동안 출시된 다양한 흥미로운 내용을 오늘 여러분과 나누고자 합니다. 작업 중인 새 리전, 연구원을 위한 새로운 도구, Amazon Timestream, Control Tower 및 Amazon Inspector에 대한 업데이트, .NET용 Lambda Powertools, 기존 서비스의 추가 위치 도입, 다른 AWS 블로그의 게시물, 예정된 이벤트 등에 대해 알려 드리겠습니다. 지난 주 출시 사항 다음은 지난주에 있던 몇 가지 눈에 띄는 출시 사항입니다. 말레이시아의 AWS 리전 — 말레이시아의 AWS 리전을 개발 중입니다. 이제 현재 작업 중인 리전 수가 5개로 늘어났습니다. 다음 리전에는 3개의 가용 영역이 포함될 예정이며, 이는 2037년까지 말레이시아에 최소 60억 달러를 투자하겠다는 당사의 노력의 일환입니다. 제 게시물을 읽고 엔터프라이즈, 스타트업 및 공공 부문 고객이 이미 AWS를 어떻게 사용하고 있는지 알아볼 수 있습니다. 연구용 Amazon Lightsail — 몇 번의 클릭만으로 Scilab, RStudio 및 Jupyter와 같은 분석 애플리케이션에 액세스할 수 [ more… ]

NGINX Tutorial: How to Deploy and Configure Microservices

2023-03-08 KENNETH 0

NGINX Tutorial: How to Deploy and Configure Microservices This post is one of four tutorials that help you put into practice concepts from Microservices March 2023: Start Delivering Microservices: How to Deploy and Configure Microservices (this post) How to Securely Manage Secrets in Containers (coming soon) How to Use GitHub Actions to Automate Microservices Canary Releases (coming soon) How to Use OpenTelemetry Tracing to Understand Your Microservices (coming soon) intro $ kubectl get pods NAME READY STATUS RESTARTS AGE coffee-87cf76b96-5b85h 1/1 Running 0 7h39m coffee-87cf76b96-lqjrp 1/1 Running 0 7h39m tea-55bc9d5586-9z26v 1/1 Running 0 111m All apps require configuration, but the considerations when configuring a microservice may not be the same as for a monolithic app. We can look to Factor 3 (Store config in the environment) of the twelve‑factor app for guidance applicable to both types of apps, but that guidance can be [ more… ]