No Image

USN-5390-1: Linux kernel vulnerabilities

2022-04-26 KENNETH 0

USN-5390-1: Linux kernel vulnerabilities David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2022-1015) David Bouman discovered that the netfilter subsystem in the Linux kernel did not initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2022-1016) It was discovered that the ST21NFCA NFC driver in the Linux kernel did not properly validate the size of certain data in EVT_TRANSACTION events. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-26490) Source: USN-5390-1: Linux kernel vulnerabilities

No Image

USN-5388-2: OpenJDK vulnerabilities

2022-04-26 KENNETH 0

USN-5388-2: OpenJDK vulnerabilities It was discovered that OpenJDK incorrectly verified ECDSA signatures. An attacker could use this issue to bypass the signature verification process. (CVE-2022-21449) It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21426) It was discovered that OpenJDK incorrectly handled converting certain object arguments into their textual representations. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21434) It was discovered that OpenJDK incorrectly validated the encoded length of certain object identifiers. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21443) It was discovered that OpenJDK incorrectly validated certain paths. An attacker could possibly use this issue to bypass the secure validation feature and expose sensitive information in XML files. [ more… ]

No Image

USN-5388-1: OpenJDK vulnerabilities

2022-04-26 KENNETH 0

USN-5388-1: OpenJDK vulnerabilities It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21426) It was discovered that OpenJDK incorrectly handled converting certain object arguments into their textual representations. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21434) It was discovered that OpenJDK incorrectly validated the encoded length of certain object identifiers. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-21443) It was discovered that OpenJDK incorrectly validated certain paths. An attacker could possibly use this issue to bypass the secure validation feature and expose sensitive information in XML files. (CVE-2022-21476) It was discovered that OpenJDK incorrectly parsed certain URI strings. An attacker could possibly use this issue to make applications accept [ more… ]

Amazon Aurora Serverless v2 정식 출시 – 워크로드 요구 사항에 따른 즉각적인 DB 크기 조정

2022-04-26 KENNETH 0

Amazon Aurora Serverless v2 정식 출시 – 워크로드 요구 사항에 따른 즉각적인 DB 크기 조정 오늘 Aurora PostgreSQL 및 MySQL에 대해 Amazon Aurora Serverless v2의 정식 출시를 발표하게 되어 매우 기쁩니다. Aurora Serverless는 Amazon Aurora의 온디맨드 자동 크기 조정 구성으로서, 이를 통해 애플리케이션의 요구 사항에 따라 데이터베이스의 용량을 확장하거나 축소할 수 있습니다. Amazon Aurora는 클라우드용으로 구축된 MySQL 및 PostgreSQL 호환 관계형 데이터베이스입니다. 이 데이터베이스는 Amazon Relational Database Service(RDS)에서 완전히 관리하므로 하드웨어 프로비저닝, 데이터베이스 설정, 패치, 백업과 같은 시간 소모적인 관리 작업이 자동화됩니다. Amazon Aurora의 주요 기능 중 하나는 컴퓨팅과 스토리지의 분리입니다. 이에 따라 독립적으로 크기가 조정됩니다. Amazon Aurora 스토리지는 데이터베이스의 데이터 양이 증가함에 따라 자동으로 크기가 조정됩니다. 예를 들어, 많은 양의 데이터를 저장할 수 있으며 언젠가 해당 데이터 대부분을 삭제하기로 한다면 프로비저닝된 스토리지가 조정됩니다. 그러나 많은 고객은 대부분의 데이터베이스 워크로드에 일정한 양의 컴퓨팅이 필요하지 않기 때문에 Amazon Aurora의 컴퓨팅 계층에서 [ more… ]

No Image

USN-5376-3: Git regression

2022-04-26 KENNETH 0

USN-5376-3: Git regression USN-5376-1 fixed vulnerabilities in Git, some patches were missing to properly fix the issue. This update fixes the problem. Original advisory details: 俞晨东 discovered that Git incorrectly handled certain repository paths in platforms with multiple users support. An attacker could possibly use this issue to run arbitrary commands. Source: USN-5376-3: Git regression