Amazon Redshift용 AWS Data Exchange 신규 기능 출시

2021-10-21 KENNETH 0

Amazon Redshift용 AWS Data Exchange 신규 기능 출시 2019년에는 AWS Data Exchange에 대해 설명하고 데이터 제품을 검색, 구독, 사용하는 방법을 보여드렸습니다. 현재 10가지 범주에서 3,600개 이상의 데이터 제품 중에서 선택할 수 있습니다. 소개 게시물에서, 데이터 제품을 구독한 다음 데이터 세트를 Amazon Simple Storage Service(Amazon S3) 버킷으로 다운로드하는 방법을 보여드렸습니다. 그리고 추가 처리를 위해 AWS Lambda 함수, AWS Glue 크롤러 또는 Amazon Athena 쿼리를 포함하는 다양한 옵션을 제안했습니다. 이제 Amazon Redshift용 AWS Data Exchange를 도입하여 서드 파티 데이터를 더욱 쉽게 검색, 구독, 사용할 수 있도록 지원합니다. 구독자는 추가 처리 없이 공급자의 데이터를 바로 사용할 수 있으며 추출, 변환, 로드(ETL) 프로세스가 필요하지 않습니다. 데이터를 처리할 필요가 없으므로 데이터는 항상 최신 상태로 유지되며 Amazon Redshift 쿼리에서 바로 사용할 수 있습니다. Amazon Redshift용 AWS Data Exchange는 고객의 모든 권한 및 결제를 관리하며, 모든 요금은 AWS 계정으로 청구됩니다. 공급자로서 이제 데이터에 라이선스를 부여하고 고객에게 제공할 [ more… ]

No Image

USN-5117-1: Linux kernel (OEM) vulnerabilities

2021-10-21 KENNETH 0

USN-5117-1: Linux kernel (OEM) vulnerabilities It was discovered that the btrfs file system in the Linux kernel did not properly handle removing a non-existent device id. An attacker with CAP_SYS_ADMIN could use this to cause a denial of service. (CVE-2021-3739) It was discovered that the Qualcomm IPC Router protocol implementation in the Linux kernel did not properly validate metadata in some situations. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2021-3743) It was discovered that the virtual terminal (vt) device implementation in the Linux kernel contained a race condition in its ioctl handling that led to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. (CVE-2021-3753) It was discovered that the Linux kernel did not properly account for the memory usage of certain IPC [ more… ]

No Image

USN-5116-1: Linux kernel vulnerabilities

2021-10-21 KENNETH 0

USN-5116-1: Linux kernel vulnerabilities It was discovered that a race condition existed in the Atheros Ath9k WiFi driver in the Linux kernel. An attacker could possibly use this to expose sensitive information (WiFi network traffic). (CVE-2020-3702) Alois Wohlschlager discovered that the overlay file system in the Linux kernel did not restrict private clones in some situations. An attacker could use this to expose sensitive information. (CVE-2021-3732) It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly compute the access permissions for shadow pages in some situations. A local attacker could use this to cause a denial of service. (CVE-2021-38198) It was discovered that the Xilinx 10/100 Ethernet Lite device driver in the Linux kernel could report pointer addresses in some situations. An attacker could use this information to ease the exploitation of another vulnerability. (CVE-2021-38205) [ more… ]

No Image

USN-5115-1: Linux kernel (OEM) vulnerabilities

2021-10-21 KENNETH 0

USN-5115-1: Linux kernel (OEM) vulnerabilities It was discovered that a race condition existed in the Atheros Ath9k WiFi driver in the Linux kernel. An attacker could possibly use this to expose sensitive information (WiFi network traffic). (CVE-2020-3702) Ofek Kirzner, Adam Morrison, Benedict Schlueter, and Piotr Krysiuk discovered that the BPF verifier in the Linux kernel missed possible mispredicted branches due to type confusion, allowing a side-channel attack. An attacker could use this to expose sensitive information. (CVE-2021-33624) Benedict Schlueter discovered that the BPF subsystem in the Linux kernel did not properly protect against Speculative Store Bypass (SSB) side- channel attacks in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2021-34556) Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not properly protect against Speculative Store Bypass (SSB) side-channel attacks in some situations. [ more… ]

No Image

USN-5114-1: Linux kernel vulnerabilities

2021-10-21 KENNETH 0

USN-5114-1: Linux kernel vulnerabilities It was discovered that a race condition existed in the Atheros Ath9k WiFi driver in the Linux kernel. An attacker could possibly use this to expose sensitive information (WiFi network traffic). (CVE-2020-3702) It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly compute the access permissions for shadow pages in some situations. A local attacker could use this to cause a denial of service. (CVE-2021-38198) It was discovered that the ext4 file system in the Linux kernel contained a race condition when writing xattrs to an inode. A local attacker could use this to cause a denial of service or possibly gain administrative privileges. (CVE-2021-40490) It was discovered that the 6pack network protocol driver in the Linux kernel did not properly perform validation checks. A privileged attacker could use this to [ more… ]