No Image

웹 브라우저 암호 고도화 정책에 따른 주의 권고

2016-01-06 KENNETH 0

출처 : http://www.boho.or.kr/data/secNoticeView.do?bulletin_writing_sequence=23883 개요 MS와 Google 등 美 NIST의 권고에 따라 ‘16년 6월부터 SSL 인증서 및 코드서명 인증서 등 암호를 SHA-1에서 SHA-2로 상향예정(’16년 6월) 설명 현행 SHA-1(160비트) 기반 웹서비스 인증서 암호 체계를 ‘16년 6월부터 SHA-2(224~512비트) 기반 인증서 체계로 고도화(’16년 5월까지 SHA-1 체계 병행 허용) ‘16년 6월부터 기존 SHA-1 기반 인증서를 사용할 수 없기 때문에, 웹사이트(포털, 게임, 상거래 등) 운영자가 해당 웹서비스 인증서(SSL, 코드서명)를 신규 및 재발급, 갱신하지 않을 경우 웹사이트 접속 오류 및 실행파일 설치 오류(액티브X 등) 발생 영향받는 플랫폼 및 브라우저 플랫폼 브라우저명 SHA-2 알고리즘 미지원 플랫폼 브라우저 PC Internet Explorer Windows(XP SP2 이하) 버전 6 이하 Chrome Windows(XP SP2 이하) 버전 39 이하 FireFox Windows(XP SP2 이하) 버전 1.5 이하 Safari OS X(10.5 이하) 버전 3 이하 Opera 해당 없음 버전 6 이하 Mobile Android Browser Android(2.3이하) iOS Safari iOS 3.0 이하 Windows Mobile Internet Explorer `해당 없음 해결방안 [ more… ]

No Image

USN-2857-1: Linux kernel vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2857-1 5th January, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.04 Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 15.04: linux-image-3.19.0-43-generic 3.19.0-43.49 linux-image-3.19.0-43-lowlatency 3.19.0-43.49 linux-image-3.19.0-43-powerpc64-smp 3.19.0-43.49 linux-image-3.19.0-43-generic-lpae 3.19.0-43.49 linux-image-3.19.0-43-powerpc64-emb 3.19.0-43.49 linux-image-3.19.0-43-powerpc-smp 3.19.0-43.49 linux-image-3.19.0-43-powerpc-e500mc 3.19.0-43.49 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen [ more… ]

No Image

USN-2857-2: Linux kernel (Vivid HWE) vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2857-2 5th January, 2016 linux-lts-vivid vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-lts-vivid – Linux hardware enablement kernel from Vivid Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.19.0-43-powerpc64-emb 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-lowlatency 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-powerpc64-smp 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-generic-lpae 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-powerpc-smp 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-generic 3.19.0-43.49~14.04.1 linux-image-3.19.0-43-powerpc-e500mc 3.19.0-43.49~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable [ more… ]

No Image

USN-2858-1: Linux kernel vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2858-1 5th January, 2016 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 15.10 Summary The system could be made to run programs as an administrator. Software description linux – Linux kernel Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 15.10: linux-image-4.2.0-23-powerpc64-emb 4.2.0-23.28 linux-image-4.2.0-23-lowlatency 4.2.0-23.28 linux-image-4.2.0-23-powerpc64-smp 4.2.0-23.28 linux-image-4.2.0-23-generic 4.2.0-23.28 linux-image-4.2.0-23-powerpc-smp 4.2.0-23.28 linux-image-4.2.0-23-generic-lpae 4.2.0-23.28 linux-image-4.2.0-23-powerpc-e500mc 4.2.0-23.28 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates havebeen [ more… ]

No Image

USN-2858-2: Linux kernel (Wily HWE) vulnerability

2016-01-06 KENNETH 0

Ubuntu Security Notice USN-2858-2 5th January, 2016 linux-lts-wily vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description linux-lts-wily – Linux hardware enablement kernel from Wily Details Nathan Williams discovered that overlayfs in the Linux kernel incorrectlyhandled setattr operations. A local unprivileged attacker could use this tocreate files with administrative permission attributes and executearbitrary code with elevated privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-4.2.0-23-powerpc64-emb 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-lowlatency 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-powerpc64-smp 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-generic 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-powerpc-smp 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-generic-lpae 4.2.0-23.28~14.04.1 linux-image-4.2.0-23-powerpc-e500mc 4.2.0-23.28~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to reboot your computer to makeall the necessary changes. ATTENTION: Due to an unavoidable [ more… ]