No Image

USN-5884-1: Linux kernel (AWS) vulnerabilities

2023-02-24 KENNETH 0

USN-5884-1: Linux kernel (AWS) vulnerabilities Kirill Tkhai discovered that the XFS file system implementation in the Linux kernel did not calculate size correctly when pre-allocating space in some situations. A local attacker could use this to expose sensitive information. (CVE-2021-4155) Lee Jones discovered that a use-after-free vulnerability existed in the Bluetooth implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-20566) Duoming Zhou discovered that a race condition existed in the SLIP driver in the Linux kernel, leading to a null pointer dereference vulnerability. An attacker could use this to cause a denial of service (system crash). (CVE-2022-41858) Tamás Koczka discovered that the Bluetooth L2CAP implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate attacker could possibly use [ more… ]

Building a Docker Image of NGINX Plus with NGINX Agent for Kubernetes

2023-02-24 KENNETH 0

Building a Docker Image of NGINX Plus with NGINX Agent for Kubernetes p.indent { margin-left: 20px; white-space: nowrap; } F5 NGINX Management Suite is a family of modules for managing the NGINX data plane from a single pane of glass. By simplifying management of NGINX Open Source and NGINX Plus instances, NGINX Management Suite simplifies your processes for scaling, securing, and monitoring applications and APIs. You need to install the NGINX Agent on each NGINX instance you want to manage from NGINX Management Suite, to enable communication with the control plane and remote configuration management. For NGINX instances running on bare metal or a virtual machine (VM), we provide installation instructions in our documentation. In this post we show how to build a Docker image for NGINX Plus and NGINX Agent, to broaden the reach of NGINX Management Suite to NGINX Plus instances deployed in [ more… ]

No Image

Go Mega with Mega Man X Minecraft world inspired by Capcom’s beloved game series

2023-02-23 KENNETH 0

Go Mega with Mega Man X Minecraft world inspired by Capcom’s beloved game series Capcom’s futuristic blue bomber, the maverick hunter Mega Man X, is making a grand appearance in Minecraft. “As of now, the Mega Man X DLC by 57Digital has arrived and is live on Minecraft Marketplace,” writes Per Landin on Minecraft.net. “Relive the glory days of one of the best platformers ever brought to the Super Nintendo as X dashes from 2D right into a blocky 3D adventure! This DLC is not only rich with reploids – it’s charged with iconic levels reminiscent of the original game in the X series, features 14 skins of familiar characters and unforgettable songs from the game’s soundtrack!” Head over to Minecraft.net for details, a video and more. Source: Go Mega with Mega Man X Minecraft world inspired by Capcom’s beloved [ more… ]

No Image

AWS와 Hugging Face, 생성형 AI 접근성 및 비용 효율성을 위한 협력 발표

2023-02-23 KENNETH 0

AWS와 Hugging Face, 생성형 AI 접근성 및 비용 효율성을 위한 협력 발표 생성형 AI (Generative AI) 애플리케이션을 만드는 데 사용되는 대규모 언어 및 비전 모델 훈련, 미세 조정 및 배포를 가속화하기 위해 AWS와 Hugging Face 간의 확장된 협업을 발표합니다. 생성형 AI 애플리케이션은 텍스트 요약, 질문에 답하기, 코드 생성, 이미지 생성, 에세이 및 기사 작성 등 다양한 작업을 수행할 수 있습니다. AWS는 생성형 AI 분야에서 깊은 혁신의 역사를 가지고 있습니다. 예를 들어 Amazon은 AI를 사용하여 고객이 매주 수십억 번 상호 작용하는 Alexa와의 대화 경험을 제공하고, Create with Alexa와 같은 새로운 경험의 일부로 생성형 AI를 점점 더 많이 사용하고 있습니다. 또한 M5는 Amazon의 여러 팀이 애플리케이션에 대형 모델을 가져올 수 있도록 돕고 Amazon.com 검색 결과를 개선하도록 훈련된 대형 모델을 지원하는 Amazon Search 내의 그룹입니다. AWS는 글로벌 인프라, Amazon SageMaker, 통합 개발 환경(IDE) 코드 및 주석을 기반으로 코드 권장 사항을 생성하여 개발자 생산성을 [ more… ]

No Image

USN-5883-1: Linux kernel (HWE) vulnerabilities

2023-02-23 KENNETH 0

USN-5883-1: Linux kernel (HWE) vulnerabilities Kyle Zeng discovered that the sysctl implementation in the Linux kernel contained a stack-based buffer overflow. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-4378) It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 (V4L2) implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-20369) Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with Enhanced Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET instructions after a VM exits. A local attacker could potentially use this to expose sensitive information. (CVE-2022-26373) David Leadbeater discovered that the netfilter IRC protocol tracking implementation in [ more… ]