No Image

USN-3915-1: Ghostscript vulnerabilities

2019-03-22 KENNETH 0

USN-3915-1: Ghostscript vulnerabilities ghostscript vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary Several security issues were fixed in Ghostscript. Software Description ghostscript – PostScript and PDF interpreter Details It was discovered that Ghostscript incorrectly handled certain PostScript files. If a user or automated system were tricked into processing a specially crafted file, a remote attacker could possibly use this issue to access arbitrary files, execute arbitrary code, or cause a denial of service. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.10 ghostscript – 9.26~dfsg+0-0ubuntu0.18.10.8 libgs9 – 9.26~dfsg+0-0ubuntu0.18.10.8 Ubuntu 18.04 LTS ghostscript – 9.26~dfsg+0-0ubuntu0.18.04.8 libgs9 – 9.26~dfsg+0-0ubuntu0.18.04.8 Ubuntu 16.04 LTS ghostscript – 9.26~dfsg+0-0ubuntu0.16.04.8 libgs9 – 9.26~dfsg+0-0ubuntu0.16.04.8 Ubuntu 14.04 LTS ghostscript – 9.26~dfsg+0-0ubuntu0.14.04.8 libgs9 – 9.26~dfsg+0-0ubuntu0.14.04.8 [ more… ]

No Image

USN-3914-1: NTFS-3G vulnerability

2019-03-22 KENNETH 0

USN-3914-1: NTFS-3G vulnerability ntfs-3g vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 18.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary NTFS-3G could be made to crash or potentially run programs as an administrator if executed with specially crafted arguments. Software Description ntfs-3g – read/write NTFS driver for FUSE Details A heap buffer overflow was discovered in NTFS-3G when executing it with a relative mount point path that is too long. A local attacker could potentially exploit this to execute arbitrary code as the administrator. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 18.10 ntfs-3g – 1:2017.3.23-2ubuntu0.18.10.1 Ubuntu 18.04 LTS ntfs-3g – 1:2017.3.23-2ubuntu0.18.04.1 Ubuntu 16.04 LTS ntfs-3g – 1:2015.3.14AR.1-1ubuntu0.2 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. In general, a standard system update will make all [ more… ]

[도서] 디지털 & 미디어 리터러시

2019-03-21 KENNETH 0

[도서] 디지털 & 미디어 리터러시 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]디지털 & 미디어 리터러시 박일준,김묘은 공저 | 북스토리 | 2019년 03월 판매가 18,000원 (10%할인) | YES포인트 1,000원(5%지급) 이벤트 : IT모바일 예약판매 이벤트 인공지능의 대두로 도래할 4차 산업혁명 시대 우리 아이들을 어떻게 키울 것인가? 모두가 4차 산업혁명 시대를 이야기하고, 앞으로 어떻게 살아야 할지 고민하기 시작했다. 인공지능이 생산성을 드라마틱하게 Source: [도서] 디지털 & 미디어 리터러시

[도서] 파이썬을 이용한 머신러닝, 딥러닝 실전 앱 개발

2019-03-21 KENNETH 0

[도서] 파이썬을 이용한 머신러닝, 딥러닝 실전 앱 개발 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]파이썬을 이용한 머신러닝, 딥러닝 실전 앱 개발 쿠지라 히코우즈쿠에,스기야마 요우이치,엔도 ?스케 공저/윤인성 역 | 위키북스 | 2019년 03월 판매가 24,300원 (10%할인) | YES포인트 1,350원(5%지급) 이벤트 : IT모바일 예약판매 이벤트 최근에는 머신러닝/딥러닝 환경을 갖추기만 하면, 누구라도 쉽게 머신러닝/딥러닝을 할 수 있게 되었다. 그래서 다양한 서비스와 애플리케이션에서 머신러닝을 활용하는 경우를 볼 수 있다. 이 책은 『파이썬으로 배 Source: [도서] 파이썬을 이용한 머신러닝, 딥러닝 실전 앱 개발

No Image

USN-3912-1: GDK-PixBuf vulnerability

2019-03-21 KENNETH 0

USN-3912-1: GDK-PixBuf vulnerability gdk-pixbuf vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.04 LTS Summary GDK-PixBuf could be made to crash or run programs as your login if it opened a specially crafted file. Software Description gdk-pixbuf – GDK Pixbuf library Details It was discovered that the GDK-PixBuf library did not properly handle certain BMP images. If an user or automated system were tricked into opening a specially crafted BMP file, a remote attacker could use this flaw to cause GDK-PixBuf to crash, resulting in a denial of service, or possibly execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 LTS libgdk-pixbuf2.0-0 – 2.32.2-1ubuntu1.6 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to restart your [ more… ]