This week we look at the recent Zenbleed vulnerability affecting some AMD processors, plus we cover security updates for the Linux kernel, a high profile OpenSSH vulnerability and finally Andrei is back with a deep dive into recent academic research around how to safeguard machine learning systems when used across distributed deployments.
123 unique CVEs addressed
/usr/lib on
your local machine
sshwrmsr -a 0xc0011029 $(($(rdmsr -c 0xc0011029) | (1<<9)))
CAP_NET_ADMIN to exploit - but can get this in an
unprivileged user namespace -> privesc| Kernel type | 22.04 | 20.04 | 18.04 | 16.04 | 14.04 |
|---|---|---|---|---|---|
| aws | — | 96.2 | — | 96.2 | — |
| aws-hwe | — | — | — | 96.2 | — |
| azure | 96.3 | 96.2 | — | 96.2 | — |
| azure-5.4 | — | — | 96.2 | — | — |
| gcp | 96.3 | 96.2 | — | 96.2 | — |
| gcp-4.15 | — | — | 96.2 | — | — |
| gcp-5.15 | — | 96.3 | — | — | — |
| gcp-5.4 | — | — | 96.2 | — | — |
| generic-4.15 | — | — | 96.2 | 96.2 | — |
| generic-4.4 | — | — | — | 96.2 | 96.2 |
| generic-5.15 | — | 96.3 | — | — | — |
| generic-5.4 | — | 96.2 | 96.2 | — | — |
| gke | 96.3 | 96.2 | — | — | — |
| gke-5.15 | — | 96.3 | — | — | — |
| gke-5.4 | — | — | 96.2 | — | — |
| gkeop | — | 96.2 | — | — | — |
| gkeop-5.4 | — | — | 96.2 | — | — |
| ibm | 96.3 | 96.2 | — | — | — |
| ibm-5.4 | — | — | 96.2 | — | — |
| linux | 96.3 | — | — | — | — |
| lowlatency-4.15 | — | — | 96.2 | 96.2 | — |
| lowlatency-4.4 | — | — | — | 96.2 | 96.2 |
| lowlatency-5.15 | — | 96.3 | — | — | — |
| lowlatency-5.4 | — | 96.2 | 96.2 | — | — |
include element that specifies say <xi:include href=”.?../../../../../../../../../../etc/passwd”/> - simple PoC provided by
the upstream reporter