No Image

USN-5436-1: libXrender vulnerabilities

2022-05-24 KENNETH 0

USN-5436-1: libXrender vulnerabilities Tobias Stoeckmann discovered that libXrender incorrectly handled certain responses. An attacker could possibly use this issue to cause a denial of service, or possibly execute arbitrary code. (CVE-2016-7949, CVE-2016-7950) Source: USN-5436-1: libXrender vulnerabilities

No Image

USN-5435-1: Thunderbird vulnerabilities

2022-05-23 KENNETH 0

USN-5435-1: Thunderbird vulnerabilities Multiple security issues were discovered in Thunderbird. If a user were tricked into opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, bypass permission prompts, obtain sensitive information, bypass security restrictions, cause user confusion, or execute arbitrary code. (CVE-2022-29909, CVE-2022-29911, CVE-2022-29912, CVE-2022-29913, CVE-2022-29914, CVE-2022-29916, CVE-2022-29917) It was discovered that Thunderbird would show the wrong security status after viewing an attached message that is signed or encrypted. An attacker could potentially exploit this by tricking the user into trusting the authenticity of a message. (CVE-2022-1520) It was discovered that the methods of an Array object could be corrupted as a result of prototype pollution by sending a message to the parent process. If a user were tricked into opening a specially crafted website in a browsing [ more… ]

No Image

USN-5434-1: Firefox vulnerabilities

2022-05-23 KENNETH 0

USN-5434-1: Firefox vulnerabilities It was discovered that the methods of an Array object could be corrupted as a result of prototype pollution by sending a message to the parent process. If a user were tricked into opening a specially crafted website, an attacker could exploit this to execute JavaScript in a privileged context. Source: USN-5434-1: Firefox vulnerabilities

Amazon EC2 기반 반도체 설계 긴급 인프라를 구축한 클라우드 부스팅 사례

2022-05-23 KENNETH 0

Amazon EC2 기반 반도체 설계 긴급 인프라를 구축한 클라우드 부스팅 사례 AWS는 클라우드에서 Electronic Design Automation(EDA) 환경 및 신속한 반도체 설계 업무의 혁신을 지원합니다. 팹리스(Fabless) 및 종합 반도체 회사(IDM: Integrated Device Manufacturers)를 비롯하여 반도체 IP 공급자 및 파운드리(Foundry) 고객/파트너는 대규모 AWS 인프라를 활용하여 차세대 반도체 제품을 설계할 수 있습니다. 이지컴아이앤씨는 반도체 설계 EDA 워크로드를 위한 고성능 컴퓨팅 (High Performance Computing, HPC) 인프라를 구성하여 반도체 인더스트리에 제공해온 AWS 파트너입니다. 그동안 국내 대형 반도체 설계 고객사를 대상으로 케이스에 따라 3K~ 20K CPU 코어 규모의 Amazon Elastic Compute Cloud(Amazon EC2)를 기반으로 EDA 환경을 제공하였으며, 하이브리드 환경에서 AWS 인프라를 설계, 구축 및 운영 경험을 가지고 있습니다. 이 글에서는 반도체 설계 긴급 인프라를 구축한 클라우드 부스팅(Cloud Bursting) 사례를 공유하고자 합니다. 환경 및 요구 사항 분석 이지컴아이앤씨의 반도체 고객사는 기존 온-프레미스 데이터센터의 컴퓨팅 자원의 사용률이 최대 상태에 도달함에 따라 20K CPU 코어 규모(Intel Architecture – Hyperthreading [ more… ]

No Image

USN-5433-1: Vim vulnerabilities

2022-05-23 KENNETH 0

USN-5433-1: Vim vulnerabilities It was discovered that Vim incorrectly handled parsing of filenames in its search functionality. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service. (CVE-2021-3973) It was discovered that Vim incorrectly handled memory when opening and searching the contents of certain files. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2021-3974) It was discovered that Vim incorrectly handled memory when opening and editing certain files. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution with user privileges. (CVE-2021-3984, CVE-2021-4019, CVE-2021-4069) It was [ more… ]