No Image

USN-6053-1: PHP vulnerability

2023-05-02 KENNETH 0

USN-6053-1: PHP vulnerability It was discovered that PHP incorrectly handled certain invalid Blowfish password hashes. An invalid password hash could possibly allow applications to accept any password as valid, contrary to expectations. Source: USN-6053-1: PHP vulnerability

How to change data collection interval for sysstat on RHEL9 or Ubuntu22.04

2023-05-02 KENNETH 0

sysstat 의 수집시간 변경하기   OS : RHEL9 / Ubuntu-22.04 기본값 : 10분     기존 방법 OS : RHEL8 이하 / Ubuntu-20.04 이하 /etc/cron.d/sysstat     변경된 방법 RHEL9 : /etc/cron.d/sysstat 파일 자체가 없음 Ubuntu-22.04 : /etc/cron.d/sysstat 파일은 있으나 수정해도, 수집 시간이 변경되지 않음 /lib/systemd/system/sysstat-collect.timer      

[도서] 쉽게 설명한 C++ 핵심 가이드라인

2023-05-02 KENNETH 0

[도서] 쉽게 설명한 C++ 핵심 가이드라인 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]쉽게 설명한 C++ 핵심 가이드라인 라이너 그림 저/류광 역 | 인사이트(insight) | 2023년 05월 판매가 33,300원 (10%할인) | YES포인트 1,850원(5%지급) 이벤트 : 모셔가는 개발자 되기! 코딩테스트 대비 도서전 “C++ 핵심 가이드라인의 규칙들을 좀 더 많은 사람이 수월하게 익히게 한다는, 어렵고도 꼭 필요한 작업을 저자가 자신의 교육 기술과 업계 경험을 적용해서 완수했다는 것은 우리 C++ 핵심 가이드라인 편집자들에 Source: [도서] 쉽게 설명한 C++ 핵심 가이드라인

No Image

USN-6052-1: Linux kernel vulnerability

2023-05-01 KENNETH 0

USN-6052-1: Linux kernel vulnerability It was discovered that the Traffic-Control Index (TCINDEX) implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. Source: USN-6052-1: Linux kernel vulnerability

No Image

USN-6051-1: Linux kernel vulnerabilities

2023-05-01 KENNETH 0

USN-6051-1: Linux kernel vulnerabilities It was discovered that the Traffic-Control Index (TCINDEX) implementation in the Linux kernel did not properly perform filter deactivation in some situations. A local attacker could possibly use this to gain elevated privileges. Please note that with the fix for this CVE, kernel support for the TCINDEX classifier has been removed. (CVE-2023-1829) It was discovered that a race condition existed in the io_uring subsystem in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-1872) Source: USN-6051-1: Linux kernel vulnerabilities