No Image

Announcing Windows 11 Insider Preview Build 25381

2023-06-03 KENNETH 0

Announcing Windows 11 Insider Preview Build 25381 Hello Windows Insiders, today we are releasing Windows 11 Insider Preview Build 25381 to the Canary Channel. REMINDER: As builds released to the Canary Channel are “hot off the presses,” we will offer limited documentation for builds flighted to the Canary Channel (no known issues for example), but we will not publish a blog post for every flight – only when new features are available in a build. And like the previous Canary Channel build, this build has a few new features and changes to document. What’s new in Build 25381 SMB signing requirement changes Beginning with Windows 11 Insider Preview Build 25381 Enterprise editions, SMB signing is now required by default for all connections. This changes legacy behavior, where Windows 10 and 11 required SMB signing by default only when connecting to shares [ more… ]

No Image

USN-6135-1: Linux kernel (Azure CVM) vulnerabilities

2023-06-03 KENNETH 0

USN-6135-1: Linux kernel (Azure CVM) vulnerabilities Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32233) Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31436) Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). (CVE-2023-30456) It was discovered that [ more… ]

No Image

USN-6134-1: Linux kernel (Intel IoTG) vulnerabilities

2023-06-02 KENNETH 0

USN-6134-1: Linux kernel (Intel IoTG) vulnerabilities It was discovered that the Traffic-Control Index (TCINDEX) implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. (CVE-2023-1829) It was discovered that the Traffic-Control Index (TCINDEX) implementation in the Linux kernel contained a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-1281) It was discovered that the OverlayFS implementation in the Linux kernel did not properly handle copy up operation in some conditions. A local attacker could possibly use this to gain elevated privileges. (CVE-2023-0386) It was discovered that some AMD x86-64 processors with SMT enabled could [ more… ]

No Image

USN-6133-1: Linux kernel (Intel IoTG) vulnerabilities

2023-06-02 KENNETH 0

USN-6133-1: Linux kernel (Intel IoTG) vulnerabilities It was discovered that the Traffic-Control Index (TCINDEX) implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. (CVE-2023-1829) It was discovered that some AMD x86-64 processors with SMT enabled could speculatively execute instructions using a return address from a sibling thread. A local attacker could possibly use this to expose sensitive information. (CVE-2022-27672) Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-3707) Jordy Zomer and Alexandra Sandulescu discovered that [ more… ]

신규 AWS Snowball Edge 스토리지 최적화 디바이스 – 더 많은 스토리지와 대역폭 제공

2023-06-02 KENNETH 0

신규 AWS Snowball Edge 스토리지 최적화 디바이스 – 더 많은 스토리지와 대역폭 제공 AWS Snow Family 제품군 디바이스는 비용 효율적으로 데이터를 클라우드로 이동하고 엣지에서 데이터를 처리하는 데 사용됩니다. 향상된 Snowball Edge 스토리지 최적화 디바이스는 페타바이트 규모의 데이터 마이그레이션 프로젝트용으로 설계되었으며, 210TB의 NVMe 스토리지와 초당 최대 1.5GB의 데이터를 전송할 수 있는 기능을 갖추고 있습니다. 10GBASE-T, SFP48, QSFP28 등의 여러 연결 옵션도 디바이스에 포함되어 있습니다. 대규모 데이터 마이그레이션 마이그레이션을 최대한 원활하고 효율적으로 수행하기 위한 잘 정의된 대규모 데이터 마이그레이션 프로그램이 있습니다. 이 프로그램의 일환으로 사이트가 빠른 데이터 전송을 지원하고 개념 증명 마이그레이션을 설정할 수 있도록 협업을 제공합니다. 필요한 경우 AWS 마이그레이션 컴피턴시 파트너의 서비스와 솔루션도 추천해 드립니다. 개념 증명을 성공적으로 완료하면 Snow 마이그레이션 프로세스에 익숙해질 것이며, 아래에 설명된 프로세스를 사용하여 디바이스를 주문할 수 있습니다. AWS 영업 지원에 문의하여 대규모 데이터 마이그레이션 프로그램을 이용할 수 있습니다. 디바이스 주문 디바이스를 개별적으로 주문하고 관리할 수 [ more… ]