Summary RubyGems.org contained a bug that could allow an attacker to replace some .gem files on our servers with a different file that they supplied. We deployed a partial fix on April 2nd and a complete fix on April 4th, 2016. We also verified every .gem uploaded after Feb 8th, 2015, and found that none of them had been replaced. Gems whose name contains a dash (e.g. âblank-blankâ) uploaded befor
ãªããFacebookã¸ã®æç¨¿ã§ãAugustã®ãªãã£ã¹ã§åãè¡æãåãããæ¥æ¬ã®ã¹ãã¼ãããã¯ä¼ç¤¾ã¯ããé ãããã¦ãã¦ã¤ãã¤ãã¨ç ½ããããªäºãæ¸ããã®ãéã®å°½ãããã¬ã¿ã¬ã¿è¨ã£ã¦ãªãã§ãæ©ãããã°ã§è©³ç´°æ¸ãï¼ãã¨åæ¹é¢ãããã¬ãã·ã£ã¼ãåãã¦ãã¾ã£ãSFå¨ä½ä¸å¹´èµ·æ¥å®¶Kenã§ãããã èªåã®èãã®æ´çã«ãªã以å¤ã«ãããã¯ãIoTã¨ããã¸ã£ã³ã«ï¼ï¼ï¼ããã¼ã売ãåãã ãã§æãã¦ãã¾ãã®ã¨ãæ¬æ°ã§ãã©ãããã©ã¼ã ãç®æãã®ã¨ã§ã©ãã ãå·®ãåºãããæã£ãããæ©ããå ·ä½çã«ç¤ºãã¦ããäºä¾ããï¼ã¨æããã®ã§æ´çãã¦ã¿ã価å¤ãããã¨èãã¾ããã
Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities Docker Hub is a central repository for Docker developers to pull and push container images. We performed a detailed study on Docker Hub images to understand how vulnerable they are to security threats. Surprisingly, we found that more than 30% of images in official repositories are highly susceptible to a vari
ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ãéçºããªãããæè»½ã«èå¼±æ§æ¤æ»ããæ¹æ³ â»å½ãµã¤ãã«ã¯ããã¢ã¼ã·ã§ã³ãå«ã¾ãã¦ãã¾ãã 以åãOWASP ZAP ã«è¿½å ããã attack mode ã®æ¦è¦ ã¨ããã¨ã³ããªãæ¸ãã¾ãããããã®ATTACK modeã使ã£ãç°¡åãªã»ãã¥ãªãã£æ¤æ»ã®æé ãã¡ã¢ãã¦ããã¾ãããã®æ©è½ã使ãã°ãã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ã®éçºä¸ã«ZAPãåæã«èå¼±æ§ã¹ãã£ã³ãã¦ããã¾ãã â» ãã®æ©è½ã追å ããã ãã¼ã¸ã§ã³ 2.4 ã¯ã¾ã ãªãªã¼ã¹ããã¦ããªãã®ã§ããããã¡ã ãã ZAP Weekly ããã¦ã³ãã¼ãããã°è©¦ããã¨ãã§ãã¾ãã æ¦è¦ åºæ¬çã«ã¯ãã¦ã§ãã¢ããªã±ã¼ã·ã§ã³éçºæã«ã¦ã§ããã©ã¦ã¶ã®ãããã·ã¨ã㦠ZAP ãæå®ããã ãã§ãããã®æãZAP å´ã§ ã³ã³ããã¹ãã¨ãããã®ãè¨å®ãã¦ãATTACK mode ã«ãã¦ããã°ãã¢ã¯ã»ã¹ããURLã«å¯¾ãã¦åæã«èå¼±æ§ãã¹ãã£ã³
It looks like Lenovo has been installing adware onto new consumer computers from the company that activates when taken out of the box for the first time. The adware, named Superfish, is reportedly installed on a number of Lenovoâs consumer laptops out of the box. The software injects third-party ads on Google searches and websites without the userâs permission. Superfish appears to affect Internet
æ å ±å¦çæ¨é²æ©æ§ï¼IPAï¼ã¨JPCERTã³ã¼ãã£ãã¼ã·ã§ã³ã»ã³ã¿ã¼ï¼JPCERT/CCï¼ãå ±åã§éå¶ããèå¼±æ§é¢é£æ å ±ãã¼ã¿ã«ãµã¤ããJVNï¼Japan Valnerability Notesï¼ãã¯2014å¹´12æ22æ¥ãITæ©å¨ã®æå»åããã«åºã使ããã¦ãããµã¼ãã¼ã½ããï¼ãã¼ã¢ã³ï¼ã®ãNetwork Time Protocol daemonï¼ntpdï¼ãã«è¤æ°ã®èå¼±æ§ãè¦ã¤ãã£ããã¨ãä¼ãããçºè¦ãããèå¼±æ§ã®ä¸ã«ã¯ã䏿£ã«ç´°å·¥ãããNTPãã±ãããä¸ã¤åãåãã ãã§ããµã¼ãã¼ããããªãä¹ã£åãããå±éºæ§ããããã®ãå«ã¾ãã¦ããã è¦ã¤ãã£ãèå¼±æ§ã¯åã¤ãï¼1ï¼è¨å®ãã¡ã¤ã«ntp.confä¸ã§auth keyãè¨å®ãã¦ããªãå ´åã«ãæå·å¼·åº¦ãä½ãããã©ã«ãéµãçæãããåé¡ãï¼2ï¼å¤ããã¼ã¸ã§ã³ã®ntp-keygenããå¼±ãã·ã¼ãå¤ã使ã£ã¦ä¹±æ°ãçºçãããããåºã«æå·å¼·åº¦ã®ä½ã対称éµã
GNU Wgetã®å帰çãªãã¦ã³ãã¼ãæã®ä¸å ·åã«ãããä»»æã®ãã¼ã«ã«ãã¡ã¤ã«ãæä½ãããèå¼±æ§(CVE-2014-4877)ã«é¢ããæ¤è¨¼ã¬ãã¼ã ãæ¦è¦ã ãªã¢ã¼ãã®ãã¡ã¤ã«åå¾ãè¡ããã¼ã«GNU Wgetï¼ä»¥ä¸ãWgetï¼ã«ãä»»æã®ãã¡ã¤ã«ã®ä½æã䏿¸ããªã©ã®æä½ãå®è¡ãããèå¼±æ§(CVE-2014-4877)ãçºè¦ããã¾ãããããã¯ãWgetãå帰çã«ãã¡ã¤ã«ããã¦ã³ãã¼ãããéã®ãã·ã³ããªãã¯ãªã³ã¯ãã¡ã¤ã«ã®å¦çã«ä¸å ·åãåå¨ããããã§ãã ããã«ãããæ»æè ã¯ç´°å·¥ããã·ã³ããªãã¯ãªã³ã¯ãã¡ã¤ã«ãã¿ã¼ã²ããPCã«ãã¦ã³ãã¼ãããããã¨ã«ãããä»»æã®ãã¡ã¤ã«ã®ä½æã䏿¸ããå®è¡å¯è½ã¨ãªãã¾ãã ä»åãWgetã®å帰çã«ãã¦ã³ãã¼ãããæ©è½ã®ä¸å ·åã«ãããä»»æã®ãã¡ã¤ã«ã®ä½æã䏿¸ããå®è¡ãããèå¼±æ§(CVE-2014-4877)ã®åç¾æ§ã«ã¤ãã¦æ¤è¨¼ãè¡ãã¾ããã ãå½±é¿ãåããå¯è½æ§
bashã«èå¼±æ§ã確èªãããã¨ãã¦é¨ãã«ãªã£ã¦ãã¾ããããã§ã¯CVE-2014-6271ã«é¢ããæ å ±ãã¾ã¨ãã¾ãã #è¨è¼å 容ã«ã¤ãã¦ã誤ã£ã¦ããã追è¨ããæ¹ãããçæ å ±ããããã¾ããã@piyokangoã¾ã§ãé£çµ¡ãé¡ããã¾ãã èå¼±æ§æ å ± èå¼±æ§ã®æç§° ShellShock Bashbug CVEçªå· Bashå¨ãã§çºè¡ããã¦ããCVEã¯6ã¤ããã®å 詳細ã䏿ãªã®ã2ã¤ã(CVE-2014-6277,CVE-2014-6278) CVE çºè¦è æ³å®è å¨ ç¹è¨ CVE-2014-6271 Stephane Chazelasæ° ä»»æã®ã³ã¼ãå®è¡ ShellShockã®çºç«¯ã¨ãªã£ããã°ã CVE-2014-7169 Tavis Ormandyæ° ä»»æã®ã³ã¼ãå®è¡ CVE-2014-6271ä¿®æ£æ¼ãã«ããèå¼±æ§ CVE-2014-7186 Redhat DoS ã¡ã¢ãªç ´å£(Out-of-Bo
1: å¹½æ â ï¼ ï¼¼(^o^)ï¼ 2014/07/31(æ¨) 20:45:50.96 ID:???0.net å©ç¨è ã®å人æ å ±ã大éã«æµåºãããéä¿¡æè²å¤§æããããã»ã³ã¼ãã¬ã¼ã·ã§ã³ãï¼å²¡å±±å¸ï¼ã®äºä»¶å¯¾å¿ã«æ¹å¤ãéã¾ã£ã¦ãããä¼å¡ã¸ã®ããã³æã®éä»ã®ä»æ¹ãããããã ãã¨ã®ææãåºã¦ããã®ã ã 第ä¸è ã«ä¼å¡çªå·ã丸è¦ãã§ãçªå·ãèªã¿åããQRã³ã¼ããé²åºããããç²æ«ããä¼å¡ããã¯ãäºæ¬¡è¢«å®³ãæããããªããå人æ å ±ãæ¼ããããã責任ãã©ãæãã¦ããã®ããã¨æãã®å£°ãåºã¦ããã ï¼æä¸æ¬ã®ããæ¥ãé½å ã«ä½ãï¼ï¼ä»£ã®ç·æ§ã®ãã¨ã«ï¼éã®ééãå±ãããããããã»ã³ã¼ãã¬ã¼ã·ã§ã³ããéè¦ãªãç¥ããã§ããã¨å¤§æ¸ãããå°çã®ä¸ã«ã¯ãå人æ å ±æ¼ããã«ã¤ãã¦ã®ãè©«ã³ãã¨é¡ãããè¬ç½ªæãå ¥ã£ã¦ããã ç·æ§ãæ°ã«ãªã£ãã®ã¯ãç·æ§ã¨ãç·æ§ã®æ¯åã®ååã¨ã¨ãã«å¤å´ããè¦ããç¶æ ã«ãªã£ã¦ããï¼ï¼æ¡ã®çªå·ã ã£ãã ãå°çãè¦
ï¼2015/1/30 追è¨ï¼ææã¯ä¸æã§ãããç¾æç¹ã®github.comã¯Ed25519éµã«ã対å¿ãã¦ãã¾ãã ï¼2016/5/31 追è¨ï¼ãGitHubã«ãã°å ±åãã¦è³é$500ãé ãã話ãã§ç´¹ä»ããéããæ¢ã«å¼±ãéµã¯GitHubããåé¤ãããæ°è¦ç»é²ãã§ããªããªã£ã¦ãã¾ãã GitHub APIãå©ç¨ãã¦ãGitHubã®31661ã¢ã«ã¦ã³ãã«ç»é²ããã¦ããSSHå ¬ééµ64404åãåå¾ãã¦ã¿ã¾ãããæ½åºæ¹æ³*1ãé©å½ããã¦åãããããããªæ°ããã¾ãããé¢ç½ãçµæãå¾ãããã¨æãã®ã§ã¾ã¨ãã¦ã¿ã¾ãã SSHéµã®ç¨®é¡ éµã®ç¨®é¡ åæ° å²å RSAéµ 61749 (95.88%) DSAéµ 2647 (4.11%) ECDSAéµ 8 (0.01%) ç´6ä¸åã®éµã®ãã¡ã8åã ãECDSAï¼æ¥åDSAï¼éµãè¦ã¤ããã¾ããï¼å¸¸ç¨ãã¦ããã®ã試ãã«ç»é²ãã¦ã¿ãã ããªã®ãã¯ãããã¾ããããä½ã«ãã
Mozilla Persona ã¯ããªã¼ãã³ãª BrowserID è¦æ ¼ã«åºã¥ãããWeb ãµã¼ãã¹åãã®å®å ¨ã«åæ£åããããå®å ¨ãªèªè¨¼ã·ã¹ãã ã§ããPersona ãã©ã®ãããªãµã¤ãã§ããã¾ã誰ã使ããã¨ã確å®ã«åä½ããããã«ãMozilla ã§ã¯ç¾å¨ãå°è¦æ¨¡ãªãµã¤ããéå¶ãã¦ãã¾ãã ãªããããªãã®ãµã¤ãã§ Persona ã使ãã¹ããªã®ã§ãããï¼ Persona ã使ããã¨ã§ããµã¤ããã¨ã«ãã¹ã¯ã¼ãã管çããå¿ è¦ããªããªãã¾ããã¦ã¼ã¶ãWeb ãµã¤ãéå¶è ã¨ãã«ããã¹ã¯ã¼ãã®ä½æã管çãã»ãã¥ãªãã£å¼·åº¦ã¨ãã£ããã¨ã«é ãæ©ã¾ããå¿ è¦ããªããªãã¾ãã Persona ã¯ç°¡åã«ä½¿ããã¨ãã§ãã¾ããPersona ã使ãã¦ã¼ã¶ãªããä¾ãã° Voost ã The Times Crossword ã¨ãã£ããµã¤ãã«æ°ãã«ç»é²ããéã«ããã»ãã®2ã¯ãªãã¯ã®ä½æ¥ã ãã§ãã°ã¤ã³ãããã¨ãã§ãã¾ããã
[English] æçµæ´æ°æ¥: Mon, 16 Jun 2014 18:21:23 +0900 CCS Injection Vulnerability æ¦è¦ OpenSSLã®ChangeCipherSpecã¡ãã»ã¼ã¸ã®å¦çã«æ¬ é¥ãçºè¦ããã¾ããã ãã®èå¼±æ§ãæªç¨ãããå ´åãæå·éä¿¡ã®æ å ±ãæ¼ããããå¯è½æ§ãããã¾ãã ãµã¼ãã¨ã¯ã©ã¤ã¢ã³ãã®ä¸¡æ¹ã«å½±é¿ããããè¿ éãªå¯¾å¿ãæ±ãããã¾ãã æ»ææ¹æ³ã«ã¯å åãªåç¾æ§ããããæ¨çåæ»æçã«å©ç¨ãããå¯è½æ§ã¯é常ã«é«ãã¨èãã¾ãã 対ç åãã³ãããæ´æ°ããªãªã¼ã¹ãããã¨æãããã®ã§ããããã¤ã³ã¹ãã¼ã«ãããã¨ã§å¯¾çã§ãã¾ãã ï¼éææ´æ°ï¼ Ubuntu Debian FreeBSD CentOS Red Hat 5 Red Hat 6 Amazon Linux AMI åå OpenSSLã®ChangeCipherSpecã¡ãã»ã¼ã¸ã®å¦çã«çºè¦
5/20 é ã« å ¬éãã envchain ã¨ãããã¼ã«ã®ç´¹ä»è¨äºããä¼ç¤¾ã®æè¡ããã°ã«æ¸ããã OS X ãã¼ãã§ã¼ã³ããç°å¢å¤æ°ãã»ãããããã¼ã«ãä½ãã¾ãã - ã¯ãã¯ãããéçºè ããã° æä¸æéã®é¢ä¿ãããã¨æããã©ãæãã®ä»çµæ§æ¡æ£ãã¦ã³ã£ãããããã¾ããããã¯ç½®ãã¦ããã¦ãæ¬é¡ã ããããããããps -Eã§ä»ããã»ã¹ã§ç°å¢å¤æ°ãè¦ãããã¨ãèããã¨ãããããç°å¢å¤æ°ã«èªè¨¼æ å ±ãå ¥ãã¦ãæç¹ã§â¦ / âOS X ãã¼ãã§ã¼ã³ããç°å¢å¤æ°ãã»ãããããã¼ã«ãä½ãã¾ãã - ã¯ãã¯ãããéçºè ããã°â http://t.co/n1quG3C4Tx â Kazuho Oku (@kazuho) June 4, 2014 ããã£ã¨ãã ã¨æãã¾ãã å®éã®ã¨ããããããã¯ãªãããç°å¢å¤æ°ããã bot ãããã¨è¨ãããã¬ãã«ã§ãã¾ãç°å¢å¤æ°ã«æ©å¯æ å ±ãå ¥ããäºã好ãã§ãªãã§ãã ãªã®ã«ã
大éªå¸å¨ä½ã®æ± åè«å¹³ããããªã³ã©ã¤ã³å¦ç¿ãSchoo(ã¹ã¯ã¼)ãã®ç¡éãã³ãã³è²·ãã§ãªã¢ã«å¾¡ç¤¾ã®çé æ ªä¸»ã«ä¸ãè©°ãã
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}