Kernel Security

Read about kernel security, The latest news, videos, and discussion topics about kernel security from alibabacloud.com

Microsoft is investigating Microsoft Windows kernel exposure

On June 8, according to foreign media reports, Microsoft said in Friday that it would investigate a security vulnerability that was not repaired in Windows.  Earlier, a security researcher in Israel disclosed a security vulnerability in the Windows operating system kernel driver. According to security researcher Gil Dabah in Tel Aviv, Israel, there is a heap overflow security vulnerability in the Windows kernel. He published a brief proof of concept code on the Ragestorm.com website, which he shared with two other people, demonstrating this security ...

Linux kernel fixes a 5-year history of serious bugs

The Linux kernel fixes a 5-year history of serious buglinux kernel maintainers fix a 5-year-old serious bug that is a local privilege elevation vulnerability, and administrators and users need to update the system as quickly as possible to include the latest revision. The memory overflow bug was introduced into the kernel in the 2.6.31-RC3 released in 2009 and exists in the N_tty_write function, which controls the Linux pseudo-TTY device, allowing unprivileged users to execute malicious code. Security researcher Dan Rosenberg said it ...

Security experts release 0day code to break Linux kernel

A security expert, Brad Spengler, recently released a 0day code to attack a Linux kernel vulnerability, saying it could bypass the Linux OS's null Pointer dereference security mechanism. This code is aimed at a vulnerability in the linux2.6.30/2.6.18 kernel version, which is valid for the 32/64bit version. The 2.6.18 version is the active core of the Red Hat 5. This code bypasses the null point in the Linux kernel ...

Linux 2.6.34.10 has been released

A new longterm 2.6.34.10 kernel has been released, which contains security fixes that encourage all 2.6.34 users to update. This version extends the name of the new 2.6.34 stable series "longterm". Get now: Git:git://git.kernel.org/pub/scm/linux/kernel/git/longterm/linux-2.6.34.y.git

Microsoft survey affects Windows system kernel vulnerabilities

Microsoft said in Friday that it was investigating a vulnerability in the Windows kernel that was newly discovered by security researchers and has not been repaired. Israeli security researcher Gille Dabbach Gil Dabah recently said the Windows kernel has a buffer overflow vulnerability. Dabbach also publishes the concept verification process for this vulnerability to the Ragestorm.com Web site. In Friday, Microsoft Security Manager Jerry Bleint Jerry Bryant said: "Microsoft is investigating the ...

Microsoft to resolve Windows kernel vulnerabilities

Microsoft engineers have identified a small threat to users from the new Windows Kernel 0 vulnerability. Security research company Vupen last week released a security message about Windows kernel Vulnerabilities and warned that the vulnerability could be exploited by an attacker to crash the system or gain higher privileges. This vulnerability affects Windows XP, Windows Vista, Windows 7, Windows Server 2008, and 2003. Microsoft Response Communications Team manager Jerry Bryant at Microsoft Security Response Center ...

Oracle is not going to support Red Hat Enterprise Linux

Oracle announced in Thursday that it had acquired Ksplice, a Linux management technology company. The company's technology allows Linux administrators to use important security patches without restarting the system. The terms of this deal are not disclosed. Oracle said that Ksplice's "0 shutdown" capability would enhance Oracle's unbreakable Enterprise Linux kernel and become a standard feature in Oracle's Advanced Linux technology support offerings. Users will be able to avoid the "expensive and disruptive" system reboot that occurs every month when the Linux kernel security update is installed ...

Oracle has acquired the Linux management technology company Ksplice

The company's technology allows Linux administrators to use important security patches without restarting the system. The terms of this deal are not disclosed. Oracle said that Ksplice's "0 shutdown" capability would enhance Oracle's unbreakable Enterprise Linux kernel and become a standard feature in Oracle's Advanced Linux technology support offerings. Users will be able to avoid the "expensive and disruptive" system reboot that occurs every month when the Linux kernel security update is installed. Oracle obviously expects to use Ksplice's capabilities as a Linux technical support ...

UC Release mobile browser kernel U3 three years of research and development

"TechWeb News" June 8 News, UC excellent view of the company today held an innovation conference, officially released the self-developed mobile phone browser kernel U3. The U3 kernel is the first Chinese-created browser kernel, a three-year development by the UC Research and development team, positioned in the 3G wireless internet age mobile browser experience. According to the introduction, U3 kernel set WebKit kernel and server client mixed cloud architecture advantages in a, in addition to rendering desktop full page browsing effect, but also take into account high-speed, security, intelligence and extended performance, in the restoration of desktop full page browsing effect of the situation, can page traffic ...

Win8.1 exposure to critical kernel vulnerabilities antivirus software was terminated

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall according to the IT House report, yesterday, Microsoft issued a security bulletin to remind users to pay attention to IE 0 attacks. Today, foreign security Agency Bromium Labs found that Windows 8.1 currently has an older version of Windows Kernel vulnerability. With this loophole, hackers can easily bypass Third-party anti-virus software and other products ...

Cheetah Browser Release version 2.0

Recently, leopard Browser released version 2.0 (Beta), the kernel upgraded to Chrome 21, the kernel version of the latest dual-core browser. After the upgrade, speed and performance increase by more than 50%.       In addition, Cheetah Browser 2.0 is fully compatible with Microsoft's upcoming official release of Windows 8. Cheetah Browser is a domestic browser market rookie, June 19 this year only officially released version 1.0. It is the first domestic ...

Working Companion Insider: Linux founder working habits are bad

On March 25, Linux kernel maintainer Allen Cox (Alan Cox) has disclosed insider information about his work with Linux founder Linas Tovoz (Linus Torvalds). Tovoz is a good programmer, he says, but he is a bad engineer. In a speech to the European Conference of Free and open source software developers in February this year, Cox disclosed that Tovoz is good at developing code, but he does not like other work related to software development, such as fixing faults ...

Windows XP user faces new 0day vulnerability attack

A new Windows kernel 0day vulnerability is being used to attack Windows XP users. Microsoft has confirmed the vulnerability and issued a security warning. The local claim vulnerability is a combination of an Adobe Reader vulnerability that invades Windows XP machines, and a vulnerable version of Adobe Reader includes 9.5.4, 10.1.6, and 11.0.02. This exploit allows an attacker to execute arbitrary code in kernel mode, including installing malicious programs, browsing, modifying or deleting data, and creating full administrative rights ...

WIN7 Update the Microsoft Official patch after the unlimited restart problem

&http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; On the day of "Patch Tuesday" in April, Microsoft released a Windows 7 KB2823324 security Update (for Win7 file system kernel mode), but some users suffered an infinite restart failure. The report comes from Win7 x86, Brazil.

2014syscan360--Android system kernel level Bootkit attack disclosure

July 16, 360 hosted the 2014 Asian Security Technology Summit SyScan360 Strong landing in Beijing. At the meeting, Shendi, a 360-strong security researcher, showed a lot of interest in the video of using Bootkit attack technology to penetrate Android phones. It is reported that the two-day SyScan360 a total of hundreds of world-renowned security technology experts and top security geeks at the scene to share the latest information security technology results. 498) this.width=498 ' OnMouseWheel = ' java ...

Opera says the browser kernel actually doesn't have a real breakthrough.

The most important or central part of the browser is "Rendering Engine", which may be translated as "interpretation engine," but we are generally accustomed to calling it the "browser kernel."   Responsible for interpreting Web page syntax (such as HTML, JavaScript) and rendering (displaying) Web pages. So, usually the so-called browser kernel is the browser's use of the rendering engine, the rendering engine determines how the browser to display the content of the page and the format of the page information. Different browser kernels have different interpretations of the syntax of the Web page, so the same page does not ...

Linux Kernel System kernel 2.6.34 official release

Another three months apart, Linus Torvalds today released the 2.6.34 official version of the Linux kernel system kernel. New features, the Linux 2.6.34 kernel version of the official release of a large number of open source http://www.aliyun.com/zixun/aggregation/36046.html "> Graphics driver update, notebook set display exclusive switching support ( Also known as hybrid graphics but need to restart X), distributed flash ...

Devil-linux 1.6-RC2 publishes a professional Linux security release

Devil-linux is a professional Linux security release, primarily for security firewalls, routers, gateways, and servers. The goal is to become a small, 17813.html "> Customizable and Secure Linux system." Its configuration can be saved to a floppy disk or USB disk, and has multiple optional packages. Devil-linux 1.6-RC2 This release updates the Linux kernel 3.2.4,mysql 5.5.20, fixes reported problems, and many other updates. Software...

Security researchers want to demonstrate a rootkit remote Android phone

June 4 International reports, security researchers will demonstrate how to borrow rootkit installed on Android smartphones, allowing hackers to use the various functions on the phone. According to the agenda of the meeting, Nicholas Percoco and Christian Papathanasiou, a researcher at the trustwave of the security firm, are scheduled to Las Vegas at DEFCON meeting in July, to demonstrate the use of the core (kernel) level rootkit , read the SMS on the Android phone, and call the unauthorized long-distance power ...

Linux Insider Story: Gray-haired people can first modify the kernel

Kernel defender Andrew Morton an exclusive conversation with Tencent Technology.  Andrew Morton half joked that Gray-haired (man)--really long time in the kernel to make a contribution to the Linux kernel when modified to get priority.  As a Linux kernel defender, Andrew's job is to communicate with the Linux community around the world every day, balancing code from all sides, deciding which ones can go into the kernel and what needs to be changed. Andrew said that ten years ago, most of the Linux kernel contribution to people is purely fun, will be from ...

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go
Tags Index:

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.