OSSã«é¢ããã»ãã¥ãªãã£ã»ãã¼ã«ã®ä½¿ãæ¹ã»èå¼±æ§çãç´¹ä»ãã¦ãã¾ãã SELinux/Capability/AntiVirus/SCAP/SIEM/Threat Intelligenceçã
OSSã«é¢ããã»ãã¥ãªãã£ã»ãã¼ã«ã®ä½¿ãæ¹ã»èå¼±æ§çãç´¹ä»ãã¦ãã¾ãã SELinux/Capability/AntiVirus/SCAP/SIEM/Threat Intelligenceçã
2024å¹´7æ1æ¥ãOpenSSHã®éçºãã¼ã ã¯æ·±å»ãªèå¼±æ§ CVE-2024-6387 ã確èªãããã¨ãã¦ã»ãã¥ãªãã£æ å ±ãçºåºããèå¼±æ§ãä¿®æ£ãããã¼ã¸ã§ã³ãå ¬éãã¾ããããã®èå¼±æ§ãçºè¦ããQualysã«ããã°ãæ¢å®è¨å®ã§æ§æãããsshdãå½±é¿ãåããã¨ãããå½±é¿ãåããã¨ã¿ãããã¤ã³ã¿ã¼ãããæ¥ç¶å¯è½ãªãã¹ããå¤æ°ç¨¼åãã¦ããç¶æ³ã«ããã¨å ±åãã¦ãã¾ããããã§ã¯é¢é£ããæ å ±ãã¾ã¨ãã¾ãã æ¦è¦ æ·±å»ãªèå¼±æ§ã確èªãããã®ã¯OpenSSHãµã¼ãã¼ï¼sshdï¼ã³ã³ãã¼ãã³ããèå¼±æ§ãæªç¨ãããå ´åãç¹æ¨©ã§ãªã¢ã¼ãããèªè¨¼ãªãã®ä»»æã³ã¼ãå®è¡ããããæããããã æªç¨ã«ãããå ±åãªã©ã¯å ¬è¡¨æç¹ã§ããã¦ããªãããglibcãã¼ã¹ã®Linuxã«ããã¦æ»æãæåãããã¨ãæ¢ã«å®è¨¼ãããã¦ãããçºè¦è ã®Qualysã¯ãã®èå¼±æ§ã®å®è¨¼ã³ã¼ããå ¬éããªãæ¹éã¨ãã¦ããããã¤ã³ã¿ã¼ãããä¸ã§ã¯PoC
ãVMware製åãæ±ããªã»ã©ã¼ãããçªç¶ã©ã¤ã»ã³ã¹ã®å¥ç´æ´æ¹ãè¿«ãããããå®è³ªå¹´é1ååã®å¤ä¸ãã«ãªãã·ã¹ãã ããããã©ããããã®ãå°ã£ã¦ãããã2024å¹´5æãæ¥çµã¯ãã¹ããã¯ã«å¤§æéèæ©é¢ã§æ å ±ã·ã¹ãã é¨éã®ç®¡çè·ãåããAæ°ããæ²é³´ã®å£°ãå¯ããããã ãã£ããã¯2024å¹´4æãå社ã®é¦æ¸¯æ ç¹ããæ¥æ¬æ¬ç¤¾ã«å¯¾ãããVMware製åã®ã©ã¤ã»ã³ã¹å¤æ´ã®éç¥ã¡ã¼ã«ãæ¥ã¦ãããã©ã対å¿ãã¹ããæ©ãã§ãããã¨ã®ç¸è«ãå±ãããç±³å½ã欧å·ãæ±åã¢ã¸ã¢ãªã©ã®æ ç¹ã«ããåæ§ã®éç¥ããã£ãã¨ããã å¤æ´ã®å½±é¿ã試ç®ããã¨ãããç¾ç¶ã¨æ¯ã¹ã¦æ大20åã®å¤ä¸ãã«ãªããã®ããã£ããï¼Aæ°ï¼ãä¸ã«ã¯ã1é±é以å ã«å¿ããªãå ´åããããªãå¤ä¸ãã«è¸ã¿åããã¨ãã£ããåã°è ãã®ãããªå 容ããã£ããï¼åï¼ã¨ããã æµ·å¤æ ç¹ããã®ç¸è«ãåãã¦ãå社ãå½å æ¬ç¤¾ã®ç¶æ³ã調ã¹ãã¨ãããå社ã°ã«ã¼ãã®ã·ã¹ãã é¢é£ä¼ç¤¾å®ã¦ã«ããå½
2024å¹´3æ29æ¥ãLinuxåãå§ç¸®ã¦ã¼ãã£ãªãã£ã¨ãã¦åºãå©ç¨ããã¦ããXZ Utilsã«æ·±å»ãªèå¼±æ§ CVE-2024-3094 ã確èªãããã¨ãã¦ãç 究è ããã³ããã»ãã¥ãªãã£æ å ±ãå ¬éãã¾ããããã®èå¼±æ§ã¯ç¹å®ã®æ¡ä»¶ä¸ã«ããã¦ããã¯ãã¢ã¨ãã¦æªç¨ãããæãããããã®ã¨ã¿ããã¦ãããå½è©²ã½ããã¦ã¨ã¢ã®ã¡ã³ããã®ã¢ã«ã¦ã³ãã«ããå®è£ ãããã½ããã¦ã¨ã¢ãµãã©ã¤ãã§ã¼ã³æ»æã®å¯è½æ§ãææããã¦ãã¾ããããã§ã¯é¢é£ããæ å ±ãã¾ã¨ãã¾ãã èå¼±æ§ã®æ¦è¦ xzã¨ã¯ä¸»è¦ãªLinuxãã£ã¹ããªãã¥ã¼ã·ã§ã³ã«å«ã¾ããæ±ç¨çãªãã¼ã¿å§ç¸®å½¢å¼ã§ãä»ååé¡ã確èªãããã®ã¯ãã®å§ç¸®ã»è§£åã¦ã¼ãã£ãªãã£ã§ããliblzma(API)ãå«ãXZ UtilsãCVE-2024-3094ãæ¡çªããã¦ãããRed Hatã«ãã£ã¦è©ä¾¡ãããCVSSåºæ¬å¤ã¯ãã«ã¹ã³ã¢ã®10ãå½±é¿ãåããã©ã¤ãã©ãªããªã³ã¯ãã¦ããssh
2023å¹´10æ16æ¥ãCiscoã¯å社ã®ãããã¯ã¼ã¯è£½åã®OSã¨ãã¦æè¼ããã¦ããCisco IOS XEã«æªä¿®æ£ï¼å½æï¼ã®èå¼±æ§ CVE-2023-20198 ããã³ CVE-2023-20273 ãæªç¨ããæ´»åã確èªãããã¨ãã¦ã»ãã¥ãªãã£æ å ±ãå ¬éãã¾ããã CVE-2023-20198ã¯æ¨©éææ ¼ã®èå¼±æ§ã§ããªã¢ã¼ããã管çè ã«ç¸å½ããã¢ã«ã¦ã³ããä½æãããæããããã¾ããã¾ããã®å¾ã®èª¿æ»ã§ããã«å¥ã®èå¼±æ§ CVE-2023-20273 ãæªç¨ããã¦ãããã¨ãå¤æãã¾ãããå社㯠CVE-2023-20198 ãæ大ã®æ·±å»åº¦ã§ããCriticalã¨è©ä¾¡ãã¦ãããèå¼±æ§ã¸ã®å¯¾å¿ãå¼·ãå¼ã³æãã¦ãã¾ããããã§ã¯é¢é£ããæ å ±ãã¾ã¨ãã¾ãã èå¼±æ§ CVE-2023-20198 / CVE-2023-20273 ã®æ¦è¦ Cisco社ã®è¤æ°ã®ãããã¯ã¼ã¯è£½åã«æè¼ããã¦ããCisco IOS
ç¾å¨ãWebã¢ããªã®ç´60ï¼ ãHTTP/2ãæ¡ç¨ãã¦ããã¨ããã æ°ããªæ»æã¯ãä½åä¸ãã®ãªã¯ã¨ã¹ããä½æããããã«ãã£ã³ã»ã«ãããã¨ã§æ©è½ããã¨Cloudflareã¯èª¬æããããªã¯ã¨ã¹ãï¼ãã£ã³ã»ã«ã®ãã¿ã¼ã³ã大è¦æ¨¡ã«èªååãããã¨ã§Webãµã¤ããåæ¢ã«è¿½ãè¾¼ãã 3社ã¯ãHTTP/2ãæ¡ç¨ãããããã¤ãã¼ã«å¯¾ããå¯è½ãªéãæ©ãã»ãã¥ãªãã£ããããé©ç¨ããããå¼ã³ãããã ã¯ã©ã¤ã¢ã³ãã«ãããã®æ»æã¸ã®æåçã¯ãå©ç¨å¯è½ãªãã¹ã¦ã®HTTPãã©ããä¿è·ãã¼ã«ã使ç¨ããå¤é¢çãªç·©åçã§DDoSèæ§ãå¼·åãããã¨ã ã¨ãã¦ããã Cloudflareã¯ã8æã®æ»æã«ã¤ãã¦ä»å ±åããã®ã¯ããå¯è½ãªéãå¤æ°ã®ã»ãã¥ãªãã£ãã³ãã¼ã«å¯¾å¿ã®æ©ä¼ãä¸ãããããæ å ±ãå¶éãã¦ãããã¨èª¬æããã HTTP/2 Rapid Reset Attackã®è©³ãã説æãªã©ã¯ã以ä¸ã®ãé¢é£ãªã³ã¯ãã®å社ã®å ¬å¼ããã°ãåç §
2023å¹´10æ10æ¥ãå ¨å½éè¡è³é決æ¸ãããã¯ã¼ã¯ã¯ãå社ãéç¨ãã¦ããå ¨å½éè¡ãã¼ã¿éä¿¡ã·ã¹ãã ã§ã·ã¹ãã é害ãçºçãããã¨ãå ¬è¡¨ãã¾ããããã®é害ã®å½±é¿ã«ããä¸é¨ã®éèæ©é¢ã§ééé 延ãªã©ãçãã¾ãããããã§ã¯é¢é£ããæ å ±ãã¾ã¨ãã¾ãã 560ä¸ä»¶ã®åå¼ã«å½±é¿ é害ãèµ·ããã®ã¯å ¨å½éè¡è³é決æ¸ãããã¯ã¼ã¯ï¼å ¨éãããï¼ãéç¨ããå ¨å½éè¡ãã¼ã¿éä¿¡ã·ã¹ãã ï¼å ¨éã·ã¹ãã ï¼ã®ãã¡ãå¹³æ¥8æåãã15æåã¾ã§ç¨¼åããã³ã¢ã¿ã¤ã ã·ã¹ãã ã§éèæ©é¢ã¨ã®æ¥ç¶ã«ä½¿ç¨ãããä¸ç¶ã³ã³ãã¥ã¼ã¿ã¼ï¼RCï¼ãé害ã¯10æ10æ¥8æåã«çºçãã10æ12æ¥æªæã«å¾©æ§ã«åãã対å¿ãå®äºãåæ¥8æåã®åæ¿å®äºãããã¨ã§å¾©æ§ããã*1 å ¨éã·ã¹ãã ã¯1,000è¶ ã®éèæ©é¢ãåå ãã¦ããã1å¶æ¥æ¥å½ããã®åå¼ä»¶æ°ã¯2022å¹´å®ç¸¾ã§ç´806ä¸ä»¶ãç´14å åã*2 ä»åã®ã·ã¹ãã é害ã«ããéèæ©é¢éã§è¡ãããééã«é 延ãå
ã¹ã¿ãã£ã¹ã æè¡æ¯æ´ã¦ãããã®ç¬¹æ¨ (@s_sasaki_0529) ã§ãã 2022å¹´ä¸åæãããã500ã³ã³ãã¼ãã³ããæ㤠Vue 2 ãããã¯ãã§ãã Teachme Biz ããåå¹´éã«æ¸¡ãåç¬ä½æ¥ãçµã¦ã Vue 3 ã«ç§»è¡ãããã¨ã«æåãã¾ããã æ¬è¨äºã§ã¯ãç§éãã©ã®ããã«ãã¦ãæ©è½éçºã¯æ¢ããã«ãã¼ã¸ã§ã³ã¢ãããç ´å£çå¤æ´ã¸ã®å¯¾å¿ãè¡ããã®ããç°¡åã«æ¯ãè¿ããã¨æãã¾ãã æ¨å¹´ã® TypeScript 移è¡ã®æ¬¡ã®ã¹ãããã¨ãã¦ãä»å¹´ã¯ Vue 3 移è¡ãå®ç¾ãããã¨ã«ãããç¸ä¹å¹æã§ã®ããã³ãã¨ã³ãéçºä½é¨ã®åä¸ãå®ç¾ãã¾ããã ã¢ããã¼ã·ã§ã³Teachme Biz ãVue 3 ã«ç§»è¡ããã¢ããã¼ã·ã§ã³ã¯æ¦ã以ä¸ã«ãªãã¾ãã ã¢ãã³ãã©ã¦ã¶ã«åããã¦ãªã¢ã¼ããã¯ãã£ãªã³ã°ããã Vue 3 ã®æ©æµãåãããã¨Vue 2 ã¸ã®æ©è½è¿½å ã»æ¹ä¿®ã 2.7 ã§çµäºãã¦ãã¾ã£ã
ãOSæ¨æºã®Dockerãå¤ãããã»ã»ã»ã ãUbuntu 22.04 LTSã«ææ°çDockerãã¤ã³ã¹ãã¼ã«ãããã ãã®ãããªå ´åã«ã¯ããã®è¨äºã®å 容ãåèã¨ãªãã¾ãã ãã®è¨äºã§ã¯ãUbuntu 22.04 LTSã«ææ°çDockerãã¤ã³ã¹ãã¼ã«ããæ¹æ³ã解説ãã¦ãã¾ãã æ¬è¨äºã®å 容 Ubuntu 22.04ã«ãããOSæ¨æºã®DockerUbuntu 22.04ã«ãããææ°çDockerã®ããã±ã¼ã¸åå¾Ubuntu 22.04ã¸ã®ææ°çDockerã®ã¤ã³ã¹ãã¼ã«Dockerã®åä½ç¢ºèª ããã§ã¯ãä¸è¨ã«æ²¿ã£ã¦è§£èª¬ãã¦ããã¾ãã Ubuntu 22.04ã«ãããOSæ¨æºã®Docker Ubuntuã«ã¯ãOSæ¨æºã®ã½ããã¦ã§ã¢ãåå¨ãã¦ãã¾ãã ApacheãNginxãªã©ã«ã¯ãOSæ¨æºã®ã½ããã¦ã§ã¢ãåå¨ãã¾ãã ããã¦ãDockerã«ãOSæ¨æºã®ã½ããã¦ã§ã¢ã¯åå¨ãã¦ãã¾ãã $
Some microprocessors from Intel and AMD are vulnerable to a newly discovered speculative execution attack that can covertly leak password data and other sensitive material, sending both chipmakers scrambling once again to contain what is proving to be a stubbornly persistent vulnerability. Researchers from ETH Zurich have named their attack Retbleed because it exploits a software defense known as
Bulletin ID:Â AMD-SB-1037 Potential Impact:Â Information disclosure, arbitrary speculative code execution Severity:Â Medium Summary This security bulletin addresses two issues related to CVE-2017-5715 previously known as Spectre Variant 2. As part of our efforts to continue improving security features, AMD has investigated additional issues related to CVE-2017-5715. Â This security bulletin addresses
Intelããã³AMDã®CPUã«æ°ããªèå¼±æ§ãè¦ã¤ãããæ å ±ãå ¬éããã¾ããã æ°ãã«è¦ã¤ãã£ãèå¼±æ§ã¯ãRetbleedãã¨åä»ããããSpectreã®äºç¨®ããã®èå¼±æ§ãæªç¨ããããã¨ã§ãã¡ã¢ãªå 容ã«ã¢ã¯ã»ã¹ããã¦ããã¹ã¯ã¼ããå種ãã¼ããã®ä»ã®æ©å¯æ å ±ãçªåãããæããããã¨ããã¦ãã¾ãã ãã®èå¼±æ§ã®å½±é¿ãåãã主ãªè£½åã¯ãInte第6ä¸ä»£ï½ç¬¬8ä¸ä»£(Core 6000 ï½ Core 8000ã·ãªã¼ãºãªã©)ãAMD ZenãZen+ãZen 2ä¸ä»£(Ryzen 1000 ï½ Ryzen 3000ã·ãªã¼ãºãªã©)ã®ããã»ããµã¼ã Intelã¯ãWindowsç°å¢ã«ããã¦ã¯ããã©ã«ãã§Indirect Branch Restricted Speculation (IBRS)ã使ç¨ããã¦ããããå½±é¿ãåããªãã¨ããLinuxã§å©ç¨ã§ããç·©åçãããã¨åãã¨ãã¦ãã¾ãã AMDã¯ãç·©åçã¨ãã¦
HertzBleed ä½ãã§ããã®ã OSã®é»åã¢ãã¿ãªã³ã°ãå¶éããã¦ããæï¼ä»ã¾ã§ããã¤ã¹ã«æ¥è¿ãã¦ä½ã¨ãé»å測å®ãããªãã¨é»åã«å¯¾ãããµã¤ããã£ãã«æ»æãã§ããªãã£ããã©CPUã®å¹çåã®æ©è½ã®ãããã§å®è³ªçã«ã¿ã¤ãã³ã°æ»æã«å¤æã§ãã¦ãªã¢ã¼ãããããµã¤ããã£ãã«æ»æãã§ããï¼ PQCã®æçµã©ã¦ã³ãã«æ®ã£ã¦ããSIKEã¨ããææ³ã«æ»æãã§ããï¼ ä»ã¾ã§ç¥ããã¦ããä¸å®æéã§å¦çãããææ³ã§ã¯ç§å¯æ å ±ãå®ãåããªãï¼ åæç¥è P State ããã¯CPUã®é»æºãªã©ã®ç®¡çãè¡ãACPIã¨å¼ã°ããè¦æ ¼ã®ä¸ã§CPUãåä½ç¶æ ã®ã¨ãã«ãã®æ§è½ãå¶å¾¡ããè¦æ ¼ï¼ skylakeä¸ä»£æåã ã¨100MHzåä½ã§å¨æ³¢æ°ã¨é§åé»å§ãçµã«ãªã£ã¦ãããããï¼ P stateãä½ãæã¯ãã®CPUããµãã¼ãããæå°ã®å¨æ³¢æ°ï¼é«ãã¨Turbo Boostï¼ãµãã¼ããã¦ãªãã¨ãã¯CPUã®ãã¼ã¹ã®å¨æ³¢æ°ï¼ã«ã»ããããã
JavaScriptã®ä»æ§ã¯ECMAScriptã§ãECMAScript 2015ï¼ES2015ï¼ãECMAScript 2016ï¼ES2016ï¼...ã¨ããããã«æ¯å¹´é²åãç¶ãã¦ãã¾ãã ããã¾ã§ã®ä»æ§ã¯ES2021ã§ããã æ¬æ¥6æ22æ¥ãES2022ã¯æ£å¼ä»æ§ã¨ãã¦æ¿èªãããES2022ãææ°ä»æ§ã¨ãªãã¾ããã 22.06.2022 Ecma International approves new standards - Ecma International ãã©ã¦ã¶å¯¾å¿ãå®äºãã¦ãããå ¨ã¢ãã³ãã©ã¦ã¶ï¼Google Chromeã»Firefoxã»Safariã»Microsoft Edgeï¼ã§ES2022ã®å ¨æ©è½ã使ãã¾ãã æ¬è¨äºã§ã¯ãES2022ãã¹ã¦ã®æ°æ©è½ãç´¹ä»ãã¾ãããä½ã使ããããã«ãªã£ãã®ãï¼ããã©ããã¦ãããå¿ è¦ã ã£ãã®ãï¼ãããã§ããã ãããããããããã«è§£èª¬ãã¾ãã
ã¯ããã« ããã¥ã¡ã³ãçæãã¼ã«Sphinxã使ã£ã¦ãPythonã¹ã¯ãªããã®ã¯ã©ã¹ãé¢æ°ã®docstringããHTMLããã¥ã¡ã³ããèªåçæããæ¹æ³ã解説ããã ããã¾ããªæé ã¯ä»¥ä¸ã®éãã Pythonã¹ã¯ãªããã®docstringã«ãã¯ã©ã¹ãã¡ã½ããã®èª¬æãæ¸ã Sphinxã§reStructuredText (reST) å½¢å¼ã®ã½ã¼ã¹ãã¡ã¤ã«ãçæãã Sphinxã§HTMLå½¢å¼ã®ããã¥ã¡ã³ããçæï¼ãã«ãï¼ãã reSTã¯ãã¼ã¯ã¢ããè¨èªã®ä¸ç¨®ã§ããã
Column2 = 2ãªã¬ã³ã¼ãæ°ãä¾ãã°1åã¬ã³ã¼ããã£ãå ´åããã¤ã¹ããã¯ãªãã·ã³ã§ããããªãã«æéãããããã¨ãäºæ³ããã¾ãã ã¾ãããã©ã³ã¶ã¯ã·ã§ã³ãã°ã®è¥å¤§ãæ°ã«ãªãã¨ããã§ãã ä¸æ¹ã§ãã«ã¼ã½ã«ã使ã£ã¦ã«ã¼ããã¦1ã¬ã³ã¼ããã¤UPDATEãã¦ããæ¹æ³ãèãããã¾ãã ä¾ãã°ã以ä¸ã®ã¯ã¨ãªãªã©ã§ãã DECLARE @PK INT DECLARE Cursor1 CURSOR FOR SELECT ColumnPK FROM Table1 WHERE Column2 = 2 OPEN Cursor1 FETCH NEXT Cursor1 INTO @PK WHILE @@FETCH_STATUS = 0 BEGIN UPDATE Table1 SET Colmun1 = 1 WHERE ColumnPK = @PK FETCH NEXT Cursor1 INTO @PK END
# cat /etc/redhat-release AlmaLinux release 9.0 (Emerald Puma) # cat /etc/os-release NAME="AlmaLinux" VERSION="9.0 (Emerald Puma)" ID="almalinux" ID_LIKE="rhel centos fedora" VERSION_ID="9.0" PLATFORM_ID="platform:el9" PRETTY_NAME="AlmaLinux 9.0 (Emerald Puma)" ANSI_COLOR="0;34" LOGO="fedora-logo-icon" CPE_NAME="cpe:/o:almalinux:almalinux:9::baseos" HOME_URL="https://almalinux.org/" DOCUMENTATION_
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ã©ã³ãã³ã°
ãªãªã¼ã¹ãé害æ å ±ãªã©ã®ãµã¼ãã¹ã®ãç¥ãã
ææ°ã®äººæ°ã¨ã³ããªã¼ã®é ä¿¡
å¦çãå®è¡ä¸ã§ã
j次ã®ããã¯ãã¼ã¯
kåã®ããã¯ãã¼ã¯
lãã¨ã§èªã
eã³ã¡ã³ãä¸è¦§ãéã
oãã¼ã¸ãéã
{{#tags}}- {{label}}
{{/tags}}