No Image

USN-6152-1: Linux kernel (GKE) regression

2023-06-09 KENNETH 0

USN-6152-1: Linux kernel (GKE) regression It was discovered that NFS client’s access cache implementation in the Linux kernel caused a severe NFS performance degradation in certain conditions. This updated makes the NFS file-access stale cache behavior to be optional. Source: USN-6152-1: Linux kernel (GKE) regression

No Image

USN-6151-1: Linux kernel (Xilinx ZynqMP) vulnerabilities

2023-06-09 KENNETH 0

USN-6151-1: Linux kernel (Xilinx ZynqMP) vulnerabilities It was discovered that the System V IPC implementation in the Linux kernel did not properly handle large shared memory counts. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-3669) It was discovered that the KVM VMX implementation in the Linux kernel did not properly handle indirect branch prediction isolation between L1 and L2 VMs. An attacker in a guest VM could use this to expose sensitive information from the host OS or other guest VMs. (CVE-2022-2196) Gerald Lee discovered that the USB Gadget file system implementation in the Linux kernel contained a race condition, leading to a use-after-free vulnerability in some situations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2022-4382) It was discovered that the [ more… ]

No Image

USN-6150-1: Linux kernel vulnerabilities

2023-06-09 KENNETH 0

USN-6150-1: Linux kernel vulnerabilities Patryk Sondej and Piotr Krysiuk discovered that a race condition existed in the netfilter subsystem of the Linux kernel when processing batch requests, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-32233) Gwangun Jung discovered that the Quick Fair Queueing scheduler implementation in the Linux kernel contained an out-of-bounds write vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2023-31436) Reima Ishii discovered that the nested KVM implementation for Intel x86 processors in the Linux kernel did not properly validate control registers in certain situations. An attacker in a guest VM could use this to cause a denial of service (guest crash). (CVE-2023-30456) It was discovered that the Broadcom [ more… ]

[도서] 마스터링 블록체인

2023-06-09 KENNETH 0

[도서] 마스터링 블록체인 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]마스터링 블록체인 론 랜츠,다니엘 코위리 저/반장현,유동민 역 | 에이콘출판사 | 2023년 06월 판매가 27,000원 (10%할인) | YES포인트 1,500원(5%지급) 비트코인을 시작으로 코인과 토큰은 블록체인 기술의 탄생에 중요한 역할을 해왔다. 블록체인 배경의 중심인 암호화폐와 비트코인에 대한 기본 개념을 다루고, 모든 것을 토큰화할 수 있었던 이더리움의 핵심 아이디 Source: [도서] 마스터링 블록체인

[도서] 애자일 개발의 기술 2/e

2023-06-09 KENNETH 0

[도서] 애자일 개발의 기술 2/e 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]애자일 개발의 기술 2/e 제임스 쇼어 저/김모세 역 | 에이콘출판사 | 2023년 06월 판매가 40,500원 (10%할인) | YES포인트 2,250원(5%지급) 소프트웨어를 개발하는 많은 기업은 그들이 “애자일”이라 부르는 것들을 도입한다. 하지만 애자일이 무엇인지, 어떻게 사용하는지에 대한 오해들이 만연하다. 여러분의 소프트웨어 개발팀의 기민함을 개선하고자 한 Source: [도서] 애자일 개발의 기술 2/e