Trezor One 1.7.1

Trezor heeft voor zijn hardwarewallet de Trezor One nieuwe firmware uitgebracht met 1.7.1 als versienummer. Hiermee kun je op een veilige manier jouw cryptovaluta beheren door de private key, de sleutel waarmee je betalingen kunt uitvoeren, buiten jouw computer of smartphone op te slaan. Het ondersteunt meer dan 600 verschillende cryptovaluta’s en cryptotokens, zoals bitcoin, ethereum, ripple, monero en zcash. De aankondiging van deze uitgave ziet er als volgt uit: Details about the security updates in Trezor One firmware 1.7.1 On Monday October 29th, we released the firmware update 1.7.1 for Trezor One devices. Besides functional improvements, it contains security fixes for two related issues that we learned of on September 26th and October 24th, respectively. Due to defensive techniques present in the firmware, the memory corruption triggered by both vulnerabilities activates a controlled shutdown of the Trezor One. This prevents a more dangerous outcome. Consequently, these issues only represent a remote denial of service attack which does not impact the security of the stored data. Please note that several other vendors are also affected by these issues in different ways, which significantly influenced our disclosure process. The first vulnerability is a buffer overflow present in the bech32_decode function which is contained in code written by Bitcoin Core developer Pieter Wuille. It was found during fuzz testing research by Christian Reitter (independent security researcher working closely with SatoshiLabs) in coordination with Dr. Jochen Hoenicke (security researcher at SatoshiLabs) and immediately disclosed. After assessing the impact on the Trezor One, Christian identified a number of external open-source projects which also used the affected function and began a coordinated responsible disclosure to inform them confidentially over encrypted and authenticated channels. During this process, we have worked with several projects to help them determine the practical impact on their project. Pieter Wuille has confirmed the bug. All projects have agreed to the proposed coordinated disclosure. After disclosing of the bech32_decode issue to Ledger in a later stage of the disclosure process, Ledger notified SatoshiLabs that they had found this issue independently and disclosed a second variant of the vulnerability in the cash_decode function. This function is present in bech32-derived code in the trezor-crypto library, and therefore relevant to Trezor-based projects. Similar to the bech32_decode issue, this buffer overflow is reliably detected on the Trezor One and can only be used to perform a denial of service attack. We thank Ledger for informing us about this issue. There is no evidence that either of the vulnerabilities has been used in practice. However, we encourage everyone to keep their Trezor devices up-to-date at all times. How to update the firmware? At the time of writing, the new firmware 1.7.1 is optional and available from our beta web wallet. We encourage you to update, as this brings you the latest security fixes. For firmware 1.6.2 or 1.6.3, the update process is straightforward. If you use older firmware (1.6.1 and older), you will first need to update to firmware 1.6.3. We have added a functionality to our beta web wallet which will update your Trezor in two steps, if required. Please note that if your Trezor One device is currently running firmware version 1.6.1 (bootloader version 1.4.0), your device memory will be wiped after this update. Please make sure you have the correct recovery seed with you, as you will need to recover your Trezor device from seed backup.

Share

Gerelateerde Artikelen:

  • Geen gerelateerde artikelen gevonden

Trezor One 1.7.1

Trezor heeft voor zijn hardwarewallet de Trezor One nieuwe firmware uitgebracht met 1.7.1 als versienummer. Hiermee kun je op een veilige manier jouw cryptovaluta beheren door de private key, de sleutel waarmee je betalingen kunt uitvoeren, buiten jouw computer of smartphone op te slaan. Het ondersteunt meer dan 600 verschillende cryptovaluta’s en cryptotokens, zoals bitcoin, ethereum, ripple, monero en zcash. De aankondiging van deze uitgave ziet er als volgt uit: Details about the security updates in Trezor One firmware 1.7.1 On Monday October 29th, we released the firmware update 1.7.1 for Trezor One devices. Besides functional improvements, it contains security fixes for two related issues that we learned of on September 26th and October 24th, respectively. Due to defensive techniques present in the firmware, the memory corruption triggered by both vulnerabilities activates a controlled shutdown of the Trezor One. This prevents a more dangerous outcome. Consequently, these issues only represent a remote denial of service attack which does not impact the security of the stored data. Please note that several other vendors are also affected by these issues in different ways, which significantly influenced our disclosure process. The first vulnerability is a buffer overflow present in the bech32_decode function which is contained in code written by Bitcoin Core developer Pieter Wuille. It was found during fuzz testing research by Christian Reitter (independent security researcher working closely with SatoshiLabs) in coordination with Dr. Jochen Hoenicke (security researcher at SatoshiLabs) and immediately disclosed. After assessing the impact on the Trezor One, Christian identified a number of external open-source projects which also used the affected function and began a coordinated responsible disclosure to inform them confidentially over encrypted and authenticated channels. During this process, we have worked with several projects to help them determine the practical impact on their project. Pieter Wuille has confirmed the bug. All projects have agreed to the proposed coordinated disclosure. After disclosing of the bech32_decode issue to Ledger in a later stage of the disclosure process, Ledger notified SatoshiLabs that they had found this issue independently and disclosed a second variant of the vulnerability in the cash_decode function. This function is present in bech32-derived code in the trezor-crypto library, and therefore relevant to Trezor-based projects. Similar to the bech32_decode issue, this buffer overflow is reliably detected on the Trezor One and can only be used to perform a denial of service attack. We thank Ledger for informing us about this issue. There is no evidence that either of the vulnerabilities has been used in practice. However, we encourage everyone to keep their Trezor devices up-to-date at all times. How to update the firmware? At the time of writing, the new firmware 1.7.1 is optional and available from our beta web wallet. We encourage you to update, as this brings you the latest security fixes. For firmware 1.6.2 or 1.6.3, the update process is straightforward. If you use older firmware (1.6.1 and older), you will first need to update to firmware 1.6.3. We have added a functionality to our beta web wallet which will update your Trezor in two steps, if required. Please note that if your Trezor One device is currently running firmware version 1.6.1 (bootloader version 1.4.0), your device memory will be wiped after this update. Please make sure you have the correct recovery seed with you, as you will need to recover your Trezor device from seed backup.

Share

Gerelateerde Artikelen:

  • Geen gerelateerde artikelen gevonden

GNU Compiler Collection 6.5

De ontwikkelaars en de leden van het GNU Project hebben een nieuwe versie van GNU Compiler Collection vrijgegeven. De verzameling van compilers is bij versienummer 6.5 aangekomen, en ondersteunt c, c++, objective-c, objective-c++, java, fortran, ada en go. Deze lijst kan worden uitgebreid met onder andere pascal, mercury, en cobol door de benodigde front-ends toe te voegen. Versie 6.5 is ook de laatste versie in de 6.x-tak, zoals de onderstaande aankondiging laat zien: GCC 6.5 Released The GNU Compiler Collection version 6.5 has been released. GCC 6.5 is a bug-fix release from the GCC 6 branch containing important fixes for regressions and serious bugs in GCC 6.4 with more than 250 bugs fixed since the previous release. This is also the last release from the GCC 6 branch, GCC continues to be maintained on the GCC 7 and GCC 8 branches and the development trunk. This is the list of problem reports (PRs) from GCC’s bug tracking system that are known to be fixed in the 6.5 release. This list might not be complete (that is, it is possible that some PRs that have been fixed are not listed here).

Share

Gerelateerde Artikelen:

  • Geen gerelateerde artikelen gevonden

GNU Compiler Collection 6.5

De ontwikkelaars en de leden van het GNU Project hebben een nieuwe versie van GNU Compiler Collection vrijgegeven. De verzameling van compilers is bij versienummer 6.5 aangekomen, en ondersteunt c, c++, objective-c, objective-c++, java, fortran, ada en go. Deze lijst kan worden uitgebreid met onder andere pascal, mercury, en cobol door de benodigde front-ends toe te voegen. Versie 6.5 is ook de laatste versie in de 6.x-tak, zoals de onderstaande aankondiging laat zien: GCC 6.5 Released The GNU Compiler Collection version 6.5 has been released. GCC 6.5 is a bug-fix release from the GCC 6 branch containing important fixes for regressions and serious bugs in GCC 6.4 with more than 250 bugs fixed since the previous release. This is also the last release from the GCC 6 branch, GCC continues to be maintained on the GCC 7 and GCC 8 branches and the development trunk. This is the list of problem reports (PRs) from GCC’s bug tracking system that are known to be fixed in the 6.5 release. This list might not be complete (that is, it is possible that some PRs that have been fixed are not listed here).

Share

Gerelateerde Artikelen:

  • Geen gerelateerde artikelen gevonden

Monero 0.13.0.4

Blockchains en cryptovaluta zijn, in welke vorm dan ook, inmiddels niet meer weg te denken uit het nieuws. De grondlegger van de techniek en tegelijk bekendste toepassing is Bitcoin, en aangezien het open source is, zijn er tal van zogenaamde altcoins verschenen. Begin 2014 verscheen Bytecoin op basis van het CryptoNote-protocol, dat compleet anders was. Door het mysterie van de achtergrond van Bytecoin en door de schatting dat al meer dan tachtig procent gemined was, is al gauw een groep ontwikkelaars begonnen met Bitmonero als fork, die eind april 2014 op zijn beurt werd geforked naar het huidige Monero, vanwege onenigheid onder de ontwikkelaars. Het netwerk bestaat uit tal van nodes die de Monero-client draaien. Hiervan is een update uitgekomen met versienummer 0.13.0.4, voorzien van de volgende aankondiging: Overview This is the v0.13.0.4 point release of the Monero software, and it is part of the v0.13 network wide update. That major release was due to the October 18th network update, which in turn enabled Bulletproofs for reduced transaction sizes, sets the ringsize globally to 11 for uniformity of transactions, updated the PoW algorithm to CNv2, and finally sets the max transaction size at half of the penalty free block size. This release of the software presents a number of major improvements to Monero, as well as a large set of bug fixes. Some highlights of this point release are:

Share

Gerelateerde Artikelen:

  • Geen gerelateerde artikelen gevonden

Monero 0.13.0.4

Blockchains en cryptovaluta zijn, in welke vorm dan ook, inmiddels niet meer weg te denken uit het nieuws. De grondlegger van de techniek en tegelijk bekendste toepassing is Bitcoin, en aangezien het open source is, zijn er tal van zogenaamde altcoins verschenen. Begin 2014 verscheen Bytecoin op basis van het CryptoNote-protocol, dat compleet anders was. Door het mysterie van de achtergrond van Bytecoin en door de schatting dat al meer dan tachtig procent gemined was, is al gauw een groep ontwikkelaars begonnen met Bitmonero als fork, die eind april 2014 op zijn beurt werd geforked naar het huidige Monero, vanwege onenigheid onder de ontwikkelaars. Het netwerk bestaat uit tal van nodes die de Monero-client draaien. Hiervan is een update uitgekomen met versienummer 0.13.0.4, voorzien van de volgende aankondiging: Overview This is the v0.13.0.4 point release of the Monero software, and it is part of the v0.13 network wide update. That major release was due to the October 18th network update, which in turn enabled Bulletproofs for reduced transaction sizes, sets the ringsize globally to 11 for uniformity of transactions, updated the PoW algorithm to CNv2, and finally sets the max transaction size at half of the penalty free block size. This release of the software presents a number of major improvements to Monero, as well as a large set of bug fixes. Some highlights of this point release are:

Share

Gerelateerde Artikelen:

  • Geen gerelateerde artikelen gevonden