No Image

USN-3035-2: Linux kernel (Raspberry Pi 2) vulnerability

2016-07-15 KENNETH 0

USN-3035-2: Linux kernel (Raspberry Pi 2) vulnerability Ubuntu Security Notice USN-3035-2 14th July, 2016 linux-raspi2 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Summary The system could be made to crash under certain conditions. Software description linux-raspi2 – Linux kernel for Raspberry Pi 2 Details Jan Stancek discovered that the Linux kernel's memory manager did notproperly handle moving pages mapped by the asynchronous I/O (AIO) ringbuffer to the other nodes. A local attacker could use this to cause adenial of service (system crash). Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 15.10: linux-image-4.2.0-1034-raspi2 4.2.0-1034.44 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI [ more… ]

No Image

USN-3035-3: Linux kernel (Wily HWE) vulnerability

2016-07-15 KENNETH 0

USN-3035-3: Linux kernel (Wily HWE) vulnerability Ubuntu Security Notice USN-3035-3 14th July, 2016 linux-lts-wily vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash under certain conditions. Software description linux-lts-wily – Linux hardware enablement kernel from Wily for Trusty Details USN-3035-1 fixed vulnerabilities in the Linux kernel for Ubuntu 15.10.This update provides the corresponding updates for the Linux HardwareEnablement (HWE) kernel from Ubuntu 15.10 for Ubuntu 14.04 LTS. Jan Stancek discovered that the Linux kernel's memory manager did notproperly handle moving pages mapped by the asynchronous I/O (AIO) ringbuffer to the other nodes. A local attacker could use this to cause adenial of service (system crash). Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-4.2.0-42-powerpc64-smp 4.2.0-42.49~14.04.1 [ more… ]

No Image

USN-3036-1: Linux kernel (Utopic HWE) vulnerability

2016-07-15 KENNETH 0

USN-3036-1: Linux kernel (Utopic HWE) vulnerability Ubuntu Security Notice USN-3036-1 14th July, 2016 linux-lts-utopic vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash under certain conditions. Software description linux-lts-utopic – Linux hardware enablement kernel from Utopic for Trusty Details Jan Stancek discovered that the Linux kernel's memory manager did notproperly handle moving pages mapped by the asynchronous I/O (AIO) ringbuffer to the other nodes. A local attacker could use this to cause adenial of service (system crash). Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.16.0-77-powerpc-smp 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-powerpc-e500mc 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-powerpc64-smp 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-generic 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-generic-lpae 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-powerpc64-emb 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-lowlatency 3.16.0-77.99~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need [ more… ]

No Image

USN-3037-1: Linux kernel (Vivid HWE) vulnerability

2016-07-15 KENNETH 0

USN-3037-1: Linux kernel (Vivid HWE) vulnerability Ubuntu Security Notice USN-3037-1 14th July, 2016 linux-lts-vivid vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash under certain conditions. Software description linux-lts-vivid – Linux hardware enablement kernel from Vivid for Trusty Details Jan Stancek discovered that the Linux kernel's memory manager did notproperly handle moving pages mapped by the asynchronous I/O (AIO) ringbuffer to the other nodes. A local attacker could use this to cause adenial of service (system crash). Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.19.0-65-powerpc64-smp 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-powerpc-smp 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-powerpc-e500mc 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-powerpc64-emb 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-generic 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-generic-lpae 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-lowlatency 3.19.0-65.73~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need [ more… ]

[도서] 테스트 주도 머신 러닝

2016-07-15 KENNETH 0

[도서] 테스트 주도 머신 러닝 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]테스트 주도 머신 러닝 저스틴 보조니어 저/남궁영환 역 | 에이콘출판사 | 2016년 07월 판매가 18,000원 (10%할인) | YES포인트 1,000원(5%지급) 머신 러닝은 데이터에 숨겨진 공통된 특징, 즉 패턴을 찾아내고 지속적으로 개선할 수 있도록 컴퓨팅 머신을 학습시키는 과정이라고 할 수 있다. 이 책에서는 이러한 머신 러닝 알고리즘에 테스트 주도형 개발 기법 Source: [도서] 테스트 주도 머신 러닝