No Image

USN-6224-1: Linux kernel vulnerabilities

2023-07-13 KENNETH 0

USN-6224-1: Linux kernel vulnerabilities It was discovered that the XFS file system implementation in the Linux kernel did not properly perform metadata validation when mounting certain images. An attacker could use this to specially craft a file system image that, when mounted, could cause a denial of service (system crash). (CVE-2023-2124) Wei Chen discovered that the InfiniBand RDMA communication manager implementation in the Linux kernel contained an out-of-bounds read vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-2176) Source: USN-6224-1: Linux kernel vulnerabilities

No Image

USN-6223-1: Linux kernel (Azure CVM) vulnerabilities

2023-07-13 KENNETH 0

USN-6223-1: Linux kernel (Azure CVM) vulnerabilities It was discovered that the TUN/TAP driver in the Linux kernel did not properly initialize socket data. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-1076) It was discovered that the Real-Time Scheduling Class implementation in the Linux kernel contained a type confusion vulnerability in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2023-1077) It was discovered that the ASUS HID driver in the Linux kernel did not properly handle device removal, leading to a use-after-free vulnerability. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service (system crash). (CVE-2023-1079) It was discovered that the Xircom PCMCIA network device driver in the Linux kernel did not properly handle device removal [ more… ]

No Image

USN-6222-1: Linux kernel (Xilinx ZynqMP) vulnerabilities

2023-07-13 KENNETH 0

USN-6222-1: Linux kernel (Xilinx ZynqMP) vulnerabilities Jiasheng Jiang discovered that the HSA Linux kernel driver for AMD Radeon GPU devices did not properly validate memory allocation in certain situations, leading to a null pointer dereference vulnerability. A local attacker could use this to cause a denial of service (system crash). (CVE-2022-3108) Zheng Wang discovered that the Intel i915 graphics driver in the Linux kernel did not properly handle certain error conditions, leading to a double-free. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2022-3707) It was discovered that the infrared transceiver USB driver did not properly handle USB control messages. A local attacker with physical access could plug in a specially crafted USB device to cause a denial of service (memory exhaustion). (CVE-2022-3903) Haowei Yan discovered that a race condition existed in the [ more… ]

[도서] 그림으로 이해하는 네트워크 구조와 기술

2023-07-13 KENNETH 0

[도서] 그림으로 이해하는 네트워크 구조와 기술 분야별 신상품 – 국내도서 – 컴퓨터와 인터넷 [도서]그림으로 이해하는 네트워크 구조와 기술 나카오 신지 저/김성훈 역 | 길벗 | 2023년 07월 판매가 19,800원 (10%할인) | YES포인트 1,100원(5%지급) 쉽고 재미있게 시작하는 네트워크! 우리 일상에 없어서는 안 될 인터넷과 그 바탕을 이루는 이더넷 및 TCP/IP는 모두 네트워크라는 범주에 속한다. 네트워크는 오늘날 여러 분야에서 널리 활용되면서 그 역할과 Source: [도서] 그림으로 이해하는 네트워크 구조와 기술

No Image

USN-6221-1: Linux kernel vulnerabilities

2023-07-13 KENNETH 0

USN-6221-1: Linux kernel vulnerabilities It was discovered that a race condition existed in the overlay file system implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-20321) It was discovered that the virtual terminal (vt) device implementation in the Linux kernel contained a race condition in its ioctl handling that led to an out-of-bounds read vulnerability. A local attacker could possibly use this to expose sensitive information. (CVE-2021-3753) It was discovered that the ext4 file system implementation in the Linux kernel contained a use-after-free vulnerability. An attacker could use this to construct a malicious ext4 file system image that, when mounted, could cause a denial of service (system crash). (CVE-2022-1184) Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir Shildan and Ariel Sabba discovered that some Intel processors with [ more… ]