Exploited OSS vulnerability 2022-2023

By Kazuki Omo

議題

Exploited OSS vulnerability 2022-2023

TR 412-2 [[ new Date( '2023-07-29 05:05:00+00:00' ).toLocaleDateString('ja', {year: 'numeric', month: '2-digit', day: '2-digit'}) ]] [[ new Date( '2023-07-29 05:05:00+00:00' ).toLocaleTimeString('zh-Hant', {hour12: false, hour: '2-digit', minute:'2-digit'}) ]] ~ [[ new Date( '2023-07-29 05:35:00+00:00' ).toLocaleTimeString('zh-Hant', {hour12: false, hour: '2-digit', minute:'2-digit'}) ]] en
加入行事曆 加入關注 加入關注 已關注

Nowadays security incident is increasing more and more. Then lots of vendor/community/institute are making efforts to find vulnerability on software. Not only commercial software, but also OSS is having vulnerability (remember Log4Shell, Dirty Pipe and so on). Then lots of security researchers are reporting vulnerability an d publish it with CVE-ids which is assigned by MITRE. In this session, Kazuki Omo will report recently trends of OSS CVE in 2022-2023. Also show some typical vulnerability PoC and pich up several example for exploite d vulnerability in 2022-2023 incident. And tell how you can catch up those news immediatelly and protect those vulnerability by using OSS product/solution.

講者

Kazuki Omo

Kazuki Omo

Over 20 years experience in Unix/Linux/Windows system and many of Security related product. Working for OSS community over 17 years. Nowadays, Trainer for Threat intelligence, and speaks at lots of public seminar/session.

  • Trainer for Threat Intelligence since 2020.
  • Published SELinux and related security articles from 2004-2022.
  • Maintainer of "LIDS(Linux Intrusion Detection System)".
  • Published "Linux Security textbook" from LPI-Japan.
  • Presentation on openSUSE.Asia Summit 2016 "openSUSE Security with OpenSCAP standard"
  • Presentation on LinuxWorld C&D 2004 Japan "KB1-4 Keynote:Explanation about SELinux"
  • Presentation on OSC 2007 TOKYO Japan "How to to daily operate for SELinux"

Open Source Firmware Track B8AXHU Early Birds Call For Paper - Session