Googleãçºè¦ãããCPUã®èå¼±æ§ãã¨ã¯ä½ãªã®ããã²ã¼ãã¼ã«æ§ããæ£ããæããããã®æ¹æ³ã¾ã¨ã ã©ã¤ã¿ã¼ï¼ç±³ç° è¡ ä¸è¬ã¡ãã£ã¢ã«ããã¥ã¼ã¹ã¨ãã¦åãä¸ããããã®ã§ï¼2017å¹´æ«ããã«ããã«é¨ããã ãããCPUã®èå¼±æ§ãã«ã¤ãã¦ã¯ï¼4Gamerèªè ãå¤ããèãåãã§ãããã¨ã ãããæµ·å¤ã§ã¯ï¼ãSpectreãï¼ã¹ãã¯ã¿ã¼ï¼ããMeltdownãï¼ã¡ã«ããã¦ã³ï¼ã¨ãã£ããã©ããã©ãããååãä»ãã¦ããã®ã§ï¼ãã¡ããç®ã«ããã¨ããèªè ãããã¨æãã ãIntel製ã®CPUã ããæã¤èå¼±æ§ã§ï¼AMD製ã®CPUãªãåé¡ãªããããå§ã¾ã£ã¦ï¼ãããããAMD製ã®CPUãåæ§ã®èå¼±æ§ãæ±ãã¦ãããï¼ããã«ã¯ãã¡ã¢ãªãã¼ã¸ã³ã°æ¹å¼ã®ä»®æ³è¨æ¶ã使ãCPUã®ãã¹ã¦ãæã¤èå¼±æ§ã§ããããªã©ã¨ï¼æ å ±ãé¯ç¶ãã¦ããã®ã§ï¼ä½ãä¿¡ãããããã®ãåãããªãã¨ãã人ãå¤ãã®ã§ã¯ãªãããããããããï¼ã¡ã¢ãªãã¼ã¸ã³ã°æ¹å¼
ã¤ã³ãã«x86ãã·ã³ã®å¥¥æ·±ãã§ã¯äººç¥ãããMINIX 3ããåä½ãã¦ãããèå¼±æ§ãä½ãåºãã¦ãããGoogleãã¯ãããæé¤ãããã¨ãã¦ãã ã¤ã³ãã«ã®x86ããã»ããµãç¨ããã·ã¹ãã ã§ã¯ããã®å¥¥æ·±ãã§äººç¥ããMINIX 3ãå«ã2ã¤ã»ã©ã®ã«ã¼ãã«ãããã»ããµä¸ã§ç¨¼åãã¦ããOSã¨ã¯å¥ã«ä½åãã¦ããããããèå¼±æ§ãä½ãåºãã¦ããã¨Googleã®ã¨ã³ã¸ãã¢ããè¦åãããããåãé¤ããã¨ããåããè¦ãã¦ãã¾ãã ãããã10æ23æ¥ãã26æ¥ã¾ã§ãã§ã³å ±åå½ã®ãã©ãã§è¡ãããOpen Source Summit Europeã§Googleã®Ronald Minnichæ°ã®ã»ãã·ã§ã³ãReplace Your Exploit-Ridden Firmware with Linuxãï¼èå¼±æ§ã«ã¾ã¿ãããã¡ã¼ã ã¦ã§ã¢ãLinuxã§ç½®ãæããï¼ã®ã»ãã·ã§ã³ã§èª¬æããããã¨ã§ããã ããããæµ·å¤ã®ã¡ãã£ã¢
ã¨ã°ã¼ã¯ãã£ããµã㪠PHPMailerã®ãªã¢ã¼ãã³ã¼ãå®è¡èå¼±æ§CVE-2016-10033ã¯ãå¾æ¥MTAã¨ãã¦sendmailãç¨ããå ´åã®ã¿å½±é¿ãããã¨ããã¦ãããã¾ããWordPressã¯PHPMailerããã³ãã«ãã¦ããããCVE-2016-10033ã«ããWordPressã«å¯¾ãããªã¢ã¼ãã³ã¼ãå®è¡æ»æã¯ã§ããªãã¨ããã¦ãããããããMTAã¨ãã¦Exim4ãç¨ããå ´åã«ã¯ãPHPMaileråä½ããã³WordPress 4.6ããã®ãªã¢ã¼ãã³ã¼ãå®è¡ãå¯è½ã§ãããã¨ãããã£ãã®ã§å ±åããã ã¯ããã« æ¨å¹´æ«ã«è©±é¡ã¨ãªã£ãPHPMailerã®ãªã¢ã¼ãã³ã¼ãå®è¡èå¼±æ§CVE-2016-10033ã§ãããå½åå ¬è¡¨ããã¦ããPoCãsendmailã³ãã³ãã® -X ãªãã·ã§ã³ãç¨ãããã®ã§ãã£ãããã-X ãªãã·ã§ã³ã®ãªãMTAï¼postfix, qmail, exim4çï¼ã¯ç´ã¡ã«
ç¬ç«è¡æ¿æ³äººæ å ±å¦çæ¨é²æ©æ§ (IPA) ãæä¾ããå®å ¨ãªã¦ã§ããµã¤ãéå¶å ¥éã«ã¯ãã»ã¼ããã¼ã¿ã®èªã¿è¾¼ã¿å¦çã«èµ·å ãã OS ã³ãã³ãã¤ã³ã¸ã§ã¯ã·ã§ã³ (CWE-78) ã®èå¼±æ§ãåå¨ãã¾ãã
ã¨ã°ã¼ã¯ãã£ããµã㪠WordPress 4.7ã¨4.7.1ã®REST APIã«ãèªè¨¼ãåé¿ãã¦ã³ã³ãã³ããæ¸ãæããããèå¼±æ§ãåå¨ãããæ»æã¯æ¥µãã¦å®¹æã§ããã®å½±é¿ã¯ä»»æã³ã³ãã³ãã®æ¸ãæãã§ãããããé大ãªçµæãåã¼ãã対çã¯WordPressã®ææ°çã«ãã¼ã¸ã§ã³ã¢ãããããã¨ã§ããã æ¬ç¨¿ã§ã¯ãèå¼±æ§æ··å ¥ã®åå ã«ã¤ãã¦å ±åããã ã¯ããã« WordPressæ¬ä½ã«ä¹ ãã¶ãã«é大ãªèå¼±æ§ãè¦ã¤ãã£ãã¨çºè¡¨ããã¾ããã ãããªé¢¨ã«æ¸ãã¨ãWordPressã®èå¼±æ§ãªãã¦ããã£ã¡ã ãè¦ã¤ãã£ã¦ããã¨ããæè¦ãããããã§ãããè½åçãã¤èªè¨¼ãªãã«ãä¾µå ¥ã§ããèå¼±æ§ã¯ããæ°å¹´åºã¦ããªãããã«æãã¾ããããããã¯ã©ã¹ã®ãã®ãä¹ ãã¶ãã«è¦ã¤ãã£ãã¨ãããã¨ã§ããã WordPressãæ´æ°çã§æ·±å»ãªèå¼±æ§ãä¿®æ£ãå®å ¨ç¢ºä¿ã®ããæ å ±å ¬éãå éã Make WordPress Core Conten
主è¦ãªLinuxãã£ã¹ããªãã¥ã¼ã·ã§ã³ã®ãLinux Unified Key Setup-on-disk-formatãï¼LUKSï¼ã«ãã»ãã¥ãªãã£ãã¼ã«ãåå¨ãããã¨ãæããã«ãªã£ããLUKSã¯Linuxã§ä½¿ããã¦ãããã¼ããã£ã¹ã¯æå·åã®ããã®æ¨æºçãªä»çµã¿ã ãLUKSã¯å¤ãã®å ´åããcryptsetupãã¨ããã¦ã¼ãã£ãªãã£ã使ç¨ãã¦ã»ããã¢ããããã¦ããããã®èå¼±æ§ã¯cryptsetupã«åå¨ãããã®ã§ãããªãæ·±å»åº¦ãé«ããå½±é¿ãåããLinuxãã£ã¹ããªãã¥ã¼ã·ã§ã³ã«ã¯ããDebianãããUbuntuãããFedoraãããRed Hat Enterpise Linuxãï¼RHELï¼ããSUSE Linux Enterprise Serverãï¼SLESï¼ãå«ã¾ããã ã»ãã¥ãªãã£ã¬ãã¼ãCVE-2016-4484ã«ã¯ããã®ã»ãã¥ãªãã£ãã¼ã«ãå©ç¨ããã¨ãæ»æè ã¯ã対象ã·ã¹ãã
Linuxã®åå¼·ä¸ã«COWã調ã¹ã¦ãããããããªèå¼±æ§ã®æ å ±ãè¦ã¤ããã®ã§ãAWSã®ã²ã¹ãOSã§è©¦ãã¦ã¿ã¾ããã çµè«ããè¨ãã¨ãèå¼±æ§ãåç¾ããã¾ãããï¼ä¸è¬ã¦ã¼ã¶ã¼ãrootã¦ã¼ã¶ã¼ã®ãã¡ã¤ã«ãæ¸ãæãã¦ãã¾ããã¨ã確èªï¼ ãæ å ±å ã â èå¼±æ§ã®å 容 https://dirtycow.ninja/ "A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only mem
å 責 åãæ¢ããããã£ã¦ããç¯å²ã§æ¸ããã ããªã®ã§ãæå ã§åç¾ããããã®æ£å½æ§ã¯ç¢ºèªãã¦ãã¾ããã èªå·±è²¬ä»»ã§ã©ããã ãã(2016/09/22 22:00)以éæ°ããæ å ±ãåºã¦ãã¦ããããããããæ´æ°ãã¾ããã CVE-2016-6662 ã«ã¤ãã¦ã¯ãã¡ã MySQLã«é大ãªèå¼±æ§è¦ã¤ããããããåå¨ããããã©ã«ãã§å½±é¿ - ITmedia ãã¥ã¼ã¹ oss-sec: CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day ) ãã®èå¼±æ§ãåç¾ãããããã«å¿ è¦ãªãã® (æªæ¤è¨¼) 5.5.52, 5.6.33, 5.7.15ã¯å½±é¿ãåããªãããç¥ãã¾ããã詳ããã¯å³ã®ããã«ä¸ã«ã æå ã§åç¾ããã¦ã¯ãã¾ãããã ãªãªã¸ãã«ã®èå¼±æ§å ±å ã®å½±é¿ãåãããã¼ã¸ã§ã³ããããã£ã¨ "5.7.14
æ»æã«å©ç¨ãããå ´åãroot権éã§ä»»æã®ã³ã¼ããå®è¡ããããµã¼ããå¶å¾¡ãããå¯è½æ§ãææããã¦ããã ç±³Oracleåä¸ã®ãªã¼ãã³ã½ã¼ã¹ãã¼ã¿ãã¼ã¹ãMySQLãã«æªè§£æ±ºã®èå¼±æ§ãè¦ã¤ãã£ãã¨ãã¦ãã»ãã¥ãªãã£ç 究è ã9æ12æ¥ã«æ¦ç¥ãã³ã³ã»ããå®è¨¼ã³ã¼ããå ¬éããããµã¤ãã¼æ»æã«å©ç¨ãããå ´åãroot権éã§ä»»æã®ã³ã¼ããå®è¡ããããµã¼ããå¶å¾¡ãããå¯è½æ§ãææããã¦ããã ç 究è ã®Dawid Golunskiæ°ãå ¬éããæ å ±ã«ããã°ãMySQLã®èå¼±æ§ã¯è¤æ°çºè¦ããããä¸ã§ãç¹ã«æ·±å»ãª1件ã«ã¤ãã¦ã¯ããªã¢ã¼ãã®æ»æè ãMySQLã®è¨å®ãã¡ã¤ã«ã«ä¸æ£ãªå 容ãä»è¾¼ãSQLã¤ã³ã¸ã§ã¯ã·ã§ã³æ»æã«å©ç¨ãããæããããã ãã®èå¼±æ§ã¯ãMySQLã®ææ°çãå«ã5.7ç³»ã5.6ç³»ã5.5ç³»ã®å ¨ãã¼ã¸ã§ã³ã«ãããã©ã«ãã®ç¶æ ã§åå¨ãããç¾æç¹ã§Oracle MySQLãµã¼ãã®èå¼±æ§ä¿®æ£ãããã¯åå¨
徳丸浩ããã¨ããã°ãé称ã徳丸æ¬ããã¨ãä½ç³»çã«å¦ã¶ å®å ¨ãªWebã¢ããªã±ã¼ã·ã§ã³ã®ä½ãæ¹ èå¼±æ§ãçã¾ããåçã¨å¯¾çã®å®è·µãã§ãåç¥ã®æ¹ãå¤ãéããWebã¢ããªã±ã¼ã·ã§ã³ã®ã»ãã¥ãªãã£å°é家ã¨ãã¦ããç¥ããã¦ãã¾ãã ä»åã¯WordCamp Toyko 2016ã«ãç»å£ããã ã徳丸ããã«ãã»ãã·ã§ã³ã®å 容ãæè¿ã®ã»ãã¥ãªãã£äºæ ãªã©ã«ã¤ãã¦ãããã£ã¦æ¥ã¾ãããå½æ¥ã®ç®çã»ãã·ã§ã³ã®ä¸ã¤ã§ãããCMSå天çã¸ã®æ»æãã¢ãéãã¦ãWordPressã®å¹æçãªé²å¾¡æ³ãå¦ã¼ããã楽ãã¿ã«ããã¦ããæ¹ã¯ããã²ã覧ãã ãããåå ç»é²ãã¾ã ã®æ¹ã¯ãã¡ãï¼ å ´æ HASHã³ã³ãµã«ãã£ã³ã° èãæ é«æ©æ樹ï¼WordCamp Tokyo 2016 å®è¡å§å¡é·ï¼ ââæ¬æ¥ã¯ãæéããã ãããããã¨ããããã¾ãããã¾ãã¯ããµã ã徳丸ããèªèº«ã代表ãåããHASHã³ã³ãµã«ãã£ã³ã°ã§ã®ãä»äºã«ã¤ãã¦ãèãããã ã
11. ã³ã¼ãã®å·®åãã diff -r -u joomla-3.4.5/libraries/joomla/session/session.php joomla-3.4.6/libraries/joomla/session/session.php --- joomla-3.4.5/libraries/joomla/session/session.php 2015-10-21 17:48:16.000000000 +0900 +++ joomla-3.4.6/libraries/joomla/session/session.php 2015-12-14 14:42:12.000000000 +0900 - - // Check for clients browser - if (in_array('fix_browser', $this->_security) && isset($_SERV
å°å·ãã ã¡ã¼ã«ã§éã ããã¹ã HTML é»åæ¸ç± PDF ãã¦ã³ãã¼ã ããã¹ã é»åæ¸ç± PDF ã¯ãªããããè¨äºãMyãã¼ã¸ããèªããã¨ãã§ãã¾ã ç´80ï¼ ãã®ãAndroidã端æ«ããå ããé示ãããLinuxã«ã¼ãã«ã®èå¼±æ§ã®å½±é¿ãåããã ã»ãã¥ãªãã£ä¼æ¥ã®Lookoutãç±³å½æé8æ15æ¥ã®ããã°æ稿ã§è¿°ã¹ãã¨ããã«ããã¨ããã®èå¼±æ§ã¯Linuxã«ã¼ãã«3.6以ä¸ã使ç¨ãã¦ããOSã«åå¨ãããAndroid 4.4 KitKatã以éã®Androidãæè¼ããã¹ãã¼ããã©ã³ã¨ã¿ãã¬ããã«å½±é¿ãåã¼ãã¨ããã ææ°ã®çµ±è¨ãã¼ã¿ããå¤æããã¨ãå½±é¿ãåããã¹ãã¼ããã©ã³ããã³ã¿ãã¬ããã¯14åå°ãè¶ ããå¯è½æ§ãããï¼ãAndroid Nougatãéçºè ãã¬ãã¥ã¼çãæè¼ãã端æ«ãå«ãï¼ã ãWindowsãã¨ãMacãã¯ãã®èå¼±æ§ã®å½±é¿ãåããªãã åé¡ã®èå¼±æ§ï¼CVE-20
ã«ãªãã©ã«ãã¢å¤§å¦ãã®ç 究è ããå ¬éãããã¯ã¤ããã¼ãã¼ãOff-Path TCP Exploits: Global Rate Limit Considered Dangerous (PDF)ãããLinuxã«ã¼ãã«ãã¼ã¸ã§ã³3.6以éã«ã¯ãããã¯ã¼ã¯ã¹ã¿ãã¯ã«é大ãªèå¼±æ§ããããé éããæ»æè ã«ãã£ã¦TCPéä¿¡ã®å 容ãæ¨æ¸¬ãããå±éºæ§ãããã¨ææãã¦ãããã¨ãè¤æ°ã®ã¡ãã£ã¢ãä¼ãããLinuxã«ã¼ãã«3.6ã¯2012å¹´ã«å ¬éããã¦ãããå½±é¿ç¯å²ãåºç¯å²ã«åã¶å¯è½æ§ãé«ã注æãå¿ è¦ã ç 究è ããææããèå¼±æ§ã¯ãã¹å¤TCPæ»æ(Off-Path TCP Exploits)ã許ãã¦ãã¾ãã¨ãããã®ã1åéã»ã©ã®æ»æã§90%ç¨åº¦ã®ç¢ºçã§éä¿¡ã«å²ãè¾¼ããã±ãããçæãããã¨ãå¯è½ã«ãªãã¨ããã¦ããããã®æ»æã¯åãã¦ãããã¨ããããã«ããããããåºç¯å²ã«å½±é¿ãåã¶å¯è½æ§ãé«ããLinux以å¤ã®ãªã
ã¯ããã« ãµã¼ã管çããã¦ãã身ã¨ãã¦ã¯ã ã»ãã¥ãªã㣠ã¯å¸¸ã«ä»ãã¾ã¨ãæªéã¿ãããªãã®ã§ããã®ã»ãã¥ãªãã£ã«é¢ãã¦ã¯ä½ãã©ãã¾ã§é å¼µãã°ããã®ãä¸éæãªé¨åãå¤ãã èå¼±æ§ã«é¢ãã¦ã¯ãCVEãªã©ãæ¯æ¥æ å ±ã¯å ¥ã£ã¦ãããããããã©ã®ãµã¼ãã®ä½ã«é¢é£ãããã®ãªã®ããªãã¦ãã¡ãã¡èª¿ã¹ã¦ãããªãããã©ã®èå¼±æ§ãããã«å¯¾å¿ããªããã°ãããªããã®ã§ãã©ã®èå¼±æ§ããã¨ãã¨å¯¾å¿ããã°ãããã®ãªã®ããªãã¦ããããªãã å®éã®ã¨ããã大ããªè©±é¡ã«ãªã£ãèå¼±æ§ãããããç·æ¥ã§å¯¾å¿ãã¦ãªãã¨ãã人ã¯å¤ãã®ã§ã¯ãªããã¨æãã ãããªä¸ãæºãæãã¦ç»å ´ããã®ã vuls !! åãµã¼ãã®èå¼±æ§æ å ±ãåå¾ãã¦ãåã ã®ãµã¼ãããããã§ã©ããªèå¼±æ§ããããã©ã®ããããã°ãèå¼±æ§ãªã®ããæ¤ç¥ã§ããããã«ãªã£ãï¼ ä»åã¯ãã®vulsãç´¹ä»ãã¾ãã Vulsã¨ã¯ å ¬å¼ã§ãã´ãçºè¡¨ãããã®ã§ãå·®ãæ¿ãã¾ãã å ¬å¼ããã¥ã¡ã³ã:
2016å¹´3æ1æ¥(ç¾å°æé)ãOpenSSL ããã¸ã§ã¯ãã¯èå¼±æ§ã®æ称ãDROWNãããCacheBleedããå«ã8件ã®èå¼±æ§æ å ±ãå ¬éãããããå½±é¿ãåãããã®ã®ä¿®æ£ãè¡ã£ãææ°çããªãªã¼ã¹ãã¾ãããããã§ã¯é¢é£æ å ±ãã¾ã¨ãã¾ãã èå¼±æ§æ å ±æ¦è¦ 注æåèµ· OpenSSL ã®è¤æ°ã®èå¼±æ§ã«é¢ãã注æåèµ· - JPCERT/CC SSLv2 DROWN Attack - US-CERT OpenSSL Projectã®å ¬éæ å ± Forthcoming OpenSSL releases OpenSSL Security Advisory ï¼»1st March 2016ï¼½ OpenSSL version 1.0.1s published OpenSSL version 1.0.2g published An OpenSSL Userâs Guide to DROWN 2016å¹´3æ1æ¥å ¬
ï¼ææ°ã®è¨äºãæ²è¼ãã¾ããï¼ ã·ã³ã¸ã§ããã¾ãããOpenSSLã«é度ã®èå¼±æ§ãããã¨ã®ãã¨ã§ãã7æ9æ¥ã«ã¢ãããã¼ãããªãªã¼ã¹ãããããã§ããã対象ç¯å²ãªã©ãcloudpackã®CSIRTï¼èå¼±æ§å¯¾å¿ãã¼ã ï¼ã®éç¨ã«åã£ã¦è¦ã¦ã¿ã¾ãã çºè¡¨ãããåæãè¦ã¦ã¿ãThe OpenSSL project team would like to announce the forthcoming release of OpenSSL versions 1.0.2d and 1.0.1p. These releases will be made available on 9th July. They will fix a single security defect classified as âhighâ severity. This defect does not affect the 1.0.
ææ°ã®æ å ±ã¯ä»¥ä¸ããã°ããåç §ãã ããã 2017å¹´çãAWSã®ä¾µå ¥ãã¹ãã«ã¤ã㦠ã¯ããã« ä»æ¥ã¯AWSã®ä¾µå ¥ãã¹ãã®ç³è«ã«ã¤ãã¦ã¾ã¨ãããã¨æãã¾ãã 代è¡ãã¦ç³è«ããéã«ã客æ§ã«ãã¢ãªã³ã°ããã¦ããå 容ã¨ãªãã¾ãã AWSã®ä¾µå ¥ãã¹ãç³è« AWSç°å¢ã«ã¦ä¾µå ¥ãã¹ãã»èå¼±æ§ã¹ãã£ã³ãå®æ½ããå ´åã¯ãäºåã«AWSã«ç³è«ãè¡ã許å¯ãå¾ãå¿ è¦ãããã¾ãã äºåã«ç³è«ãå¿ è¦ãªçç±ã¯ãä¾µå ¥ãã¹ãã»èå¼±æ§ã¹ãã£ã³ãAWSã®é©æ£å©ç¨è¦ç´ã¨åºå¥ããããã§ãã ä¾µå ¥ãã¹ããã¼ã¸ããã®å¼ç¨ ç§ãã¡ã®é©æ£å©ç¨è¦ç´ã«ã¯ãç¦æ¢ãããã»ãã¥ãªãã£éåããã³ãããã¯ã¼ã¯ä¸æ£å©ç¨ã®èª¬æãå«ãã AWS ä¸ã§è¨±å¯ãããè¡çºããã³ç¦æ¢ããã¦ããè¡çºã«ã¤ãã¦ã®èª¬æãããã¾ãã ããããä¾µå ¥ãã¹ãã¯ãããã®è¡çºã¨åºå¥ã§ããªããã¨ãããããããã å½ç¤¾ã¯ä¾µå ¥ãã¹ãããã³èå¼±æ§ã¹ãã£ã³ãå®æ½ããããã®è¨±å¯ãã客æ§ãç³è«ã§ããããª
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}