No Image

USN-5651-1: strongSwan vulnerability

2022-10-04 KENNETH 0

USN-5651-1: strongSwan vulnerability Lahav Schlesinger discovered that strongSwan incorrectly handled certain OCSP URIs and and CRL distribution points (CDP) in certificates. A remote attacker could possibly use this issue to initiate IKE_SAs and send crafted certificates that contain URIs pointing to servers under their control, which can lead to a denial-of-service attack. Source: USN-5651-1: strongSwan vulnerability

No Image

USN-5614-2: Wayland vulnerability

2022-10-04 KENNETH 0

USN-5614-2: Wayland vulnerability USN-5614-1 fixed a vulnerability in Wayland. This update provides the corresponding update for Ubuntu 16.04 ESM. Original advisory details: It was discovered that Wayland incorrectly handled reference counting certain objects. An attacker could use this issue to cause Wayland to crash, resulting in a denial of service, or possibly execute arbitrary code. Source: USN-5614-2: Wayland vulnerability

No Image

USN-5652-1: Linux kernel (Azure) vulnerabilities

2022-10-04 KENNETH 0

USN-5652-1: Linux kernel (Azure) vulnerabilities It was discovered that the framebuffer driver on the Linux kernel did not verify size limits when changing font or screen size, leading to an out-of- bounds write. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33655) Domingo Dirutigliano and Nicola Guerrera discovered that the netfilter subsystem in the Linux kernel did not properly handle rules that truncated packets below the packet header size. When such rules are in place, a remote attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-36946) Source: USN-5652-1: Linux kernel (Azure) vulnerabilities

No Image

WP Briefing: Episode 40: All Things Testing with Special Guests Anne McCarthy and Brian Alexander

2022-10-03 KENNETH 0

WP Briefing: Episode 40: All Things Testing with Special Guests Anne McCarthy and Brian Alexander In the fortieth episode of the WordPress Briefing, Josepha Haden Chomphosy sits down with special guests Anne McCarthy and Brian Alexander to discuss the Testing Team and how to get started with testing in the WordPress project. Have a question you’d like answered? You can submit them to [email protected], either written or as a voice recording. Credits Editor: Dustin HartzlerLogo: Javier ArceProduction: Santana InnissSong: Fearless First by Kevin MacLeod Guests Anne McCarthyBrian Alexander References WordPress 6.1 TestingTesting Reports w/ TemplateWeek in Test SeriesReporting Bugs Handbook PageFullsite Editing Outreach ProgramFSE Outreach Experiment Slack Channelmake.wordpress.org/testWordPress.org/newsLearn.wordpress.org#WPDiversity Speaker Workshop for Women Voices in Latin America Transcript [Josepha Haden Chomphosy 00:00:00]  Hello everyone. And welcome to the WordPress Briefing, the podcast where you can catch quick explanations of some of the ideas behind [ more… ]

No Image

파트너사를 위한 AWS Competency Program 성공을 위한 4가지 단계

2022-10-03 KENNETH 0

파트너사를 위한 AWS Competency Program 성공을 위한 4가지 단계 AWS 컴피턴시 (Competency) 프로그램은 검증된 기술 전문 지식과 입증된 고객 성공을 갖춘 AWS 파트너를 검증하고 홍보해 주는 프로그램입니다. AWS 컴피턴시를 취득한 파트너는 산업영역, 사용사례 및 워크로드 전반에 걸쳐 전문 영역에서 역량을 보여줌으로써 Amazon Web Services (AWS) 고객에게 비즈니스를 마케팅하고 차별화하는데 도움이 됩니다. AWS 파트너는 AWS 컴피턴시를 취득하는데 높은 기준에 따라 평가되며, 프로그램 요구 사항은 오늘날의 클라우드 과제를 해결할 수 있는 철저하게 검증된 파트너에게 컴피턴시가 부여되도록 보장합니다. 파트너가 AWS 컴피턴시 취득을 위해 노력할 때 AWS 파트너 네트워크 (APN) 팀이 파트너의 비즈니스를 성공으로 이끌 수 있도록 지원합니다. 목표는 파트너가 AWS 컴피턴시 자격을 취득하고 고객에게 자격을 갖춘 AWS 파트너와 협력하고 있음을 보장하는 것입니다. 이를 위해서는 AWS 파트너가 모범 사례 및 권장 사항 목록을 마련하는 것이 중요합니다. 이 블로그는 파트너가 다음 4가지 주요 단계를 통해 AWS 컴피턴시 프로그램을 달성하고 최대한 활용할 수 있는 방법을 설명 [ more… ]