No Image

USN-5467-1: Linux kernel vulnerabilities

2022-06-08 KENNETH 0

USN-5467-1: Linux kernel vulnerabilities It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) It was discovered that the SCTP protocol implementation in the Linux kernel did not properly verify VTAGs in some situations. A remote attacker could possibly use this to cause a denial of service (connection disassociation). (CVE-2021-3772) Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks [ more… ]

No Image

USN-5466-1: Linux kernel vulnerabilities

2022-06-08 KENNETH 0

USN-5466-1: Linux kernel vulnerabilities It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) It was discovered that the SCTP protocol implementation in the Linux kernel did not properly verify VTAGs in some situations. A remote attacker could possibly use this to cause a denial of service (connection disassociation). (CVE-2021-3772) It was discovered that the btrfs file system implementation in the Linux kernel did not properly handle locking [ more… ]

No Image

USN-5465-1: Linux kernel vulnerabilities

2022-06-08 KENNETH 0

USN-5465-1: Linux kernel vulnerabilities It was discovered that the Linux kernel did not properly restrict access to the kernel debugger when booted in secure boot environments. A privileged attacker could use this to bypass UEFI Secure Boot restrictions. (CVE-2022-21499) Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2022-1966) Jann Horn discovered that the Linux kernel did not properly enforce seccomp restrictions in some situations. A local attacker could use this to bypass intended seccomp sandbox restrictions. (CVE-2022-30594) Source: USN-5465-1: Linux kernel vulnerabilities

No Image

USN-5464-1: E2fsprogs vulnerability

2022-06-08 KENNETH 0

USN-5464-1: E2fsprogs vulnerability Nils Bars discovered that e2fsprogs incorrectly handled certain file systems. A local attacker could use this issue with a crafted file system image to possibly execute arbitrary code. Source: USN-5464-1: E2fsprogs vulnerability

Load Balancing TCP and UDP Traffic in Kubernetes with NGINX

2022-06-08 KENNETH 0

Load Balancing TCP and UDP Traffic in Kubernetes with NGINX [Editor– This post is an extract from our comprehensive eBook, Managing Kubernetes Traffic with F5 NGINX: A Practical Guide. Download it for free today.] Along with HTTP traffic, NGINX Ingress Controller load balances TCP and UDP traffic, so you can use it to manage traffic for a wide range of apps and utilities based on those protocols, including: MySQL, LDAP, and MQTT – TCP‑based apps used by many popular applications DNS, syslog, and RADIUS – UDP‑based utilities used by edge devices and non‑transactional applications TCP and UDP load balancing with NGINX Ingress Controller is also an effective solution for distributing network traffic to Kubernetes applications in the following circumstances: You are using end-to-end encryption (EE2E) and having the application handle encryption and decryption rather than NGINX Ingress Controller You need high‑performance load balancing [ more… ]