No Image

USN-6085-1: Linux kernel (Raspberry Pi) vulnerabilities

2023-05-18 KENNETH 0

USN-6085-1: Linux kernel (Raspberry Pi) vulnerabilities It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. (CVE-2022-27672) Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-3707) Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did not properly implement speculative execution barriers in usercopy functions in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2023-0459) It was discovered that the TLS subsystem in the Linux kernel contained a type confusion vulnerability in some situations. A local attacker could [ more… ]

No Image

USN-6084-1: Linux kernel vulnerabilities

2023-05-18 KENNETH 0

USN-6084-1: Linux kernel vulnerabilities Jordy Zomer and Alexandra Sandulescu discovered that the Linux kernel did not properly implement speculative execution barriers in usercopy functions in certain situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2023-0459) Xingyuan Mo discovered that the x86 KVM implementation in the Linux kernel did not properly initialize some data structures. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2023-1513) It was discovered that a use-after-free vulnerability existed in the iSCSI TCP implementation in the Linux kernel. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2023-2162) It was discovered that the NET/ROM protocol implementation in the Linux kernel contained a race condition in some situations, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial [ more… ]

[도서] 행동 데이터 분석

2023-05-18 KENNETH 0

[도서] 행동 데이터 분석 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]행동 데이터 분석 플로랑 뷔송 저/함진아 역 | 한빛미디어 | 2023년 05월 판매가 30,600원 (10%할인) | YES포인트 1,700원(5%지급) ‘정말 고객이 우리 광고 메일을 보고 서비스를 구독할까?’ ‘연령이 높은 고객이 구매하는 상품은 따로 있을까?’ ‘무엇이 고객의 행동을 유발하는지’에 대한 답을 주는 책! 이 책은 단순히 고객의 행동만 Source: [도서] 행동 데이터 분석

[도서] Do it! 오토캐드 2024

2023-05-18 KENNETH 0

[도서] Do it! 오토캐드 2024 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]Do it! 오토캐드 2024 박한울 저 | 이지스퍼블리싱 | 2023년 05월 판매가 25,200원 (10%할인) | YES포인트 1,400원(5%지급) 6년 연속 베스트셀러! 평면도 그리기부터 치수 문제 해결까지! 초보자도 6일이면 설계 도면 그린다! 6년 동안 독자의 의견을 꾸준히 반영해 업그레이드한 베스트셀러 《Do it! 오토캐드》가 최신 2024 버전으 Source: [도서] Do it! 오토캐드 2024

The Mission-Critical Patient-Care Use Case That Became a Kubernetes Odyssey

2023-05-18 KENNETH 0

The Mission-Critical Patient-Care Use Case That Became a Kubernetes Odyssey Downtime can lead to serious consequences. These words are truer for companies in the medical technology field than in most other industries – in their case, the "serious consequences" can literally include death. We recently had the chance to dissect the tech stack of a company that’s seeking to transform medical record keeping from pen-and-paper to secure digital data that is accessible anytime, and anywhere, in the world. These data range from patient information to care directives, biological markers, medical analytics, historical records, and everything else shared between healthcare teams. From the outset, the company has sought to address a seemingly simple question: “How can we help care workers easily record data in real time?” As the company has grown, however, the need to scale and make data constantly available [ more… ]