CVE-2018-1000802 Fedora Security Update for python2 (FEDORA-2018-c3a5b2029a)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for python2 to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-c3a5b2029a: Fedora 28

FEDORA-2018-c3a5b2029a: Fedora 27

0daybank

CVE-2018-14645 Fedora Security Update for haproxy (FEDORA-2018-381ab64b59)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for haproxy to fix the vulnerability.

Affected OS:
Fedora 28

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-381ab64b59: Fedora 28

0daybank

CVE-2018-17175 Fedora Security Update for python-marshmallow (FEDORA-2018-cc9adc4808)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for python-marshmallow to fix the vulnerability.

Affected OS:
Fedora 27
Fedora 28

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 27 Update
Fedora 28 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-cc9adc4808: Fedora 27

FEDORA-2018-cc9adc4808: Fedora 28

0daybank

CVE-2017-15705 Fedora Security Update for spamassassin (FEDORA-2018-6ed251c42b)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for spamassassin to fix the vulnerability.

Affected OS:
Fedora 27

漏洞危害

This vulnerability could be exploited to gain complete access to sensitive information. Malicious users could also use this vulnerability to change all the contents or configuration on the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-6ed251c42b: Fedora 27

0daybank

Fedora Security Update for php-horde-horde (FEDORA-2018-1de045298c)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for php-horde-horde to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-1de045298c: Fedora 28

FEDORA-2018-1de045298c: Fedora 27

0daybank

CVE-2018-1000810 Fedora Security Update for rust (FEDORA-2018-0071ad34f4)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for rust to fix the vulnerability.

Affected OS:
Fedora 27
Fedora 28

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 27 Update
Fedora 28 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-0071ad34f4: Fedora 27

FEDORA-2018-0071ad34f4: Fedora 28

0daybank

Fedora Security Update for php-horde-Horde-Core (FEDORA-2018-1f64819623)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for php-horde-horde-core to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-1f64819623: Fedora 28

FEDORA-2018-1f64819623: Fedora 27

0daybank

CVE-2015-7746 NetApp Data ONTAP Authentication Bypass Vulnerability (NTAP-20151112-0001)

漏洞类别:General remote services

漏洞等级: 

漏洞信息

NetApp Data ONTAP is a data management software which allows unifying storage infrastructures across flash, disk and cloud.

NetApp Data ONTAP operating in 7-Mode allows unauthorized information disclosure or modification on volumes that have “.UTF-8” appended to the volume language.

Affected Versions:
NetApp Data ONTAP versions prior to 8.2.4, when operating in 7-Mode

QID Detection Logic:
This QID gets vulnerable version of NetApp ONTAP either via HTTP Banner or SNMP

NOTE:This vulnerability affects devices that are operating in 7-Mode and have “.UTF-8” appended to the volume language.

漏洞危害

An unauthenticated, remote attacker could exploit this vulnerability to retrieve sensitive information or modify volumes.

解决方案

Customers are advised to refer to NTAP-20151112-0001 for more information about patching this vulnerability.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

NTAP-20151112-0001

0daybank

CVE-2018-0737 Fedora Security Update for openssli (FEDORA-2018-520e4c5b4e)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for openssli to fix the vulnerability.

Affected OS:
Fedora 27
Fedora 28

漏洞危害

This vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 27 Update
Fedora 28 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-520e4c5b4e: Fedora 27

FEDORA-2018-520e4c5b4e: Fedora 28

0daybank

Fedora Security Update for zchunk (FEDORA-2018-6a92b4f75c)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for zchunk to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

Successful exploitation allows attacker to compromise the system.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-6a92b4f75c: Fedora 28

FEDORA-2018-6a92b4f75c: Fedora 27

0daybank

CVE-2018-16790 Fedora Security Update for libbson (FEDORA-2018-77d864ff39)

漏洞类别:Fedora

漏洞等级: 

漏洞信息

Fedora has released security update for libbson to fix the vulnerability.

Affected OS:
Fedora 28
Fedora 27

漏洞危害

This vulnerability could be exploited to gain partial access to sensitive information. Additionally this vulnerability can also be used to cause a limited denial of service in the form of interruptions in resource availability.

解决方案

Fedora has issued updated packages to fix this vulnerability.

For more information about the vulnerability and obtaining patches, refer to the following Fedora security advisories:
Fedora 28 Update
Fedora 27 Update

Patch:
Following are links for downloading patches to fix the vulnerabilities:

FEDORA-2018-77d864ff39: Fedora 28

FEDORA-2018-77d864ff39: Fedora 27

0daybank

Detect Version of the Linux kernel and gcc in use

漏洞类别:Information gathering

漏洞等级: 

漏洞信息

The file /proc/version specifies the version of the Linux kernel and gcc in use, as well as the version of Linux installed on the system.

The raw output of ” cat /proc/version ” command, can be used to determine the unicity of the system and understand how memory dumps for that specific system should be handled.

QID Detection Logic :
This QID runs the ” cat /proc/version ” command to collect contents of the file.

漏洞危害

Not applicable.

解决方案

Not applicable.

0daybank

CVE-2018-15686 SUSE Enterprise Linux Security Update for systemd (SUSE-SU-2018:3767-1)

漏洞类别:SUSE

漏洞等级: 

漏洞信息

SUSE has released security update for systemd to fix the vulnerabilities.

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3

漏洞危害

This vulnerability could be exploited to gain complete access to sensitive information.Malicious users could also use this vulnerability to change all the contents or configuration on the system.Additionally this vulnerability can also be used to cause a complete denial of service and could render the resource completely unavailable.

解决方案

Upgrade to the latest packages which contain a patch. To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

To install packages using the command line interface, use the command “yum update”.

Refer to Suse security advisory SUSE-SU-2018:3767-1 to address this issue and obtain further details.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

SUSE-SU-2018:3767-1: SUSE Enterprise Linux

0daybank

CVE-2018-12389 SUSE Enterprise Linux Security Update for MozillaFirefox (SUSE-SU-2018:3749-1)

漏洞类别:SUSE

漏洞等级: 

漏洞信息

SUSE has released security update for mozillafirefox to fix the vulnerabilities.

Affected Products:
SUSE Linux Enterprise Software Development Kit 12-SP3
SUSE Linux Enterprise Server 12-SP3
SUSE Linux Enterprise Desktop 12-SP3

漏洞危害

This vulnerability could be exploited to gain complete access to sensitive information. Malicious users could also use this vulnerability to change all the contents or configuration on the system. Additionally this vulnerability can also be used to cause a complete denial of service and could render the resource completely unavailable.

解决方案

Upgrade to the latest packages which contain a patch. To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

To install packages using the command line interface, use the command “yum update”.

Refer to SUSE security advisory SUSE-SU-2018:3749-1 to address this issue and obtain further details.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

SUSE-SU-2018:3749-1: SUSE Enterprise Linux

0daybank

CVE-2017-1000407 SUSE Enterprise Linux Security Update for the Linux Kernel (SUSE-SU-2018:3746-1)

漏洞类别:SUSE

漏洞等级: 

漏洞信息

SUSE has released security update for the linux kernel to fix the vulnerabilities.

Affected Products:
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Server 11-SP4

漏洞危害

This vulnerability could be exploited to gain complete access to sensitive information. Malicious users could also use this vulnerability to change all the contents or configuration on the system. Additionally this vulnerability can also be used to cause a complete denial of service and could render the resource completely unavailable.

解决方案

Upgrade to the latest packages which contain a patch. To install this SUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product.

To install packages using the command line interface, use the command “yum update”.

Refer to SUSE security advisory SUSE-SU-2018:3746-1 to address this issue and obtain further details.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

SUSE-SU-2018:3746-1: SUSE Enterprise Linux

0daybank

CVE-2018-15471 Ubuntu Security Notification for Linux, Linux-aws, Linux-gcp, Linux-kvm, Linux-raspi2 Vulnerability (USN-3819-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that the Xen netback driver in the Linux kernel did not properly perform input validation in some situations.

漏洞危害

An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.

0daybank

CVE-2018-1000030 Ubuntu Security Notification for Python2.7, Python3.4, Python3.5 Vulnerabilities (USN-3817-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that Python incorrectly handled large amounts of data.

It was discovered that Python incorrectly handled running external commands in the shutil module.

It was discovered that Python incorrectly used regular expressions vulnerable to catastrophic backtracking.

It was discovered that Python failed to initialize Expat’s hash salt.

漏洞危害

A remote attacker could use this issue to cause Python to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2018-1000030)

A remote attacker could use this issue to cause Python to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2018-1000802)

A remote attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS. (CVE-2018-1060, CVE-2018-1061)

A remote attacker could possibly use this issue to cause hash collisions, leading to a denial of service. (CVE-2018-14647)

0daybank

CVE-2016-9588 Ubuntu Security Notification for Linux Vulnerabilities (USN-3822-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that the KVM implementation in the Linux kernel mismanages the #BP and #OF exceptions.

It was discovered that the generic SCSI driver in the Linux kernel did not properly enforce permissions on kernel memory access.

It was discovered that the CDC USB Ethernet driver did not properly validate device descriptors.

It was discovered that an integer overflow existed in the CD-ROM driver of the Linux kernel.

It was discovered that an integer overflow existed in the HID Bluetooth implementation in the Linux kernel that could lead to a buffer overwrite.

漏洞危害

A local attacker in a guest virtual machine could use this to cause a denial of service (guest OS crash). (CVE-2016-9588)

A local attacker could use this to expose sensitive information or possibly elevate privileges. (CVE-2017-13168)

A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2017-16649)

A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-16658)

An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-9363)

0daybank

CVE-2018-10880 Ubuntu Security Notification for Linux, Linux-aws, Linux-kvm, Linux-raspi2, Linux-snapdragon Vulnerabilities (USN-3821-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that the ext4 filesystem implementation in the Linux kernel did not properly ensure that xattr information remained in inode bodies.

It was discovered that the alarmtimer implementation in the Linux kernel contained an integer overflow vulnerability.

It was discovered that the f2fs filesystem implementation in the Linux kernel did not properly validate metadata.

It was and Po-Ning Tseng discovered that the btrfs filesystem implementation in the Linux kernel did not properly handle relocations in some situations.

It was discovered that the HFS+ filesystem implementation in the Linux kernel did not properly handle malformed catalog data in some situations.

it was discovered that the procfs file system implementation in the Linux kernel did not properly restrict the ability to inspect the kernel stack of an arbitrary task.

It was discovered that the KVM implementation in the Linux kernel on ARM 64bit processors did not properly handle some ioctls.

漏洞危害

An attacker could use this to construct a malicious ext4 image that, when mounted, could cause a denial of service (system crash). (CVE-2018-10880)

A local attacker could use this to cause a denial of service. (CVE-2018-13053)

An attacker could use this to construct a malicious f2fs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-13096)

An attacker could use this to construct a malicious btrfs image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14609)

An attacker could use this to construct a malicious HFS+ image that, when mounted, could cause a denial of service (system crash). (CVE-2018-14617)

A local attacker could use this to expose sensitive information. (CVE-2018-17972)

An attacker with the privilege to create KVM-based virtual machines could use this to cause a denial of service (host system crash) or execute arbitrary code in the host. (CVE-2018-18021)

解决方案

Refer to Ubuntu advisory USN-3821-1 for affected packages and patching details, or update with your package manager.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

USN-3821-1: 16.04 (Xenial) on src (linux-image-snapdragon)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-generic-lpae)

USN-3821-1: 16.04 (Xenial) on src (linux-image-powerpc-e500mc)

USN-3821-1: 16.04 (Xenial) on src (linux-image-powerpc64-emb)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-generic)

USN-3821-1: 16.04 (Xenial) on src (linux-image-powerpc64-smp)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-powerpc64-smp)

USN-3821-1: 16.04 (Xenial) on src (linux-image-aws)

USN-3821-1: 16.04 (Xenial) on src (linux-image-raspi2)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-1100-raspi2)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-lowlatency)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-1072-aws)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-1037-kvm)

USN-3821-1: 16.04 (Xenial) on src (linux-image-generic-lpae)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-powerpc-smp)

USN-3821-1: 16.04 (Xenial) on src (linux-image-lowlatency)

USN-3821-1: 16.04 (Xenial) on src (linux-image-generic)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-powerpc-e500mc)

USN-3821-1: 16.04 (Xenial) on src (linux-image-powerpc-smp)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-1104-snapdragon)

USN-3821-1: 16.04 (Xenial) on src (linux-image-4.4.0-139-powerpc64-emb)

USN-3821-1: 16.04 (Xenial) on src (linux-image-kvm)

0daybank

CVE-2017-13168 Ubuntu Security Notification for Linux, Linux-aws, Linux-azure, Linux-gcp, Linux-kvm, Linux-oem, Linux-raspi2 Vulnerabilities (USN-3820-1)

漏洞类别:Ubuntu

漏洞等级: 

漏洞信息

It was discovered that the Xen netback driver in the Linux kernel did not properly perform input validation in some situations.

It was discovered that the generic SCSI driver in the Linux kernel did not properly enforce permissions on kernel memory access.

It was discovered that an integer overflow existed in the CD-ROM driver of the Linux kernel.

It was discovered that an integer overflow existed in the HID Bluetooth implementation in the Linux kernel that could lead to a buffer overwrite.

漏洞危害

An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-15471)

A local attacker could use this to expose sensitive information or possibly elevate privileges. (CVE-2017-13168)

A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-16658)

An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-9363)

0daybank

CVE-2017-18344 Red Hat Update for kernel (RHSA-2018:3591)

漏洞类别:RedHat

漏洞等级: 

漏洞信息

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fixes: kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)
kernel: Integer overflow in Linux’s create_elf_tables function (CVE-2018-14634)For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s)
listed in the References section.Red Hat would like to thank Qualys Research Labs for reporting CVE-2018-14634.Bug Fix(es): On systems running Red Hat Enterprise Linux 7.3 with Red Hat OpenShift Container Platform 3.5, a node sometimes got into “NodeNotReady” state after a CPU softlockup. Consequently, the node was not available. This update fixes some scheduling latency sources in memory compaction and in the inodes memory reclaim. As a result, nodes no longer get into “NodeNotReady” state under the described circumstances. (BZ#1625866)
Previously, a kernel panic occurred when the kernel tried to make an out of bound access to the array that describes the L1 Terminal Fault (L1TF)
mitigation state on systems without Extended Page Tables (EPT)
support. This update extends the array of mitigation states to cover all the states, which effectively prevents out of bound array access. Also, this update enables rejecting invalid, irrelevant values, that might be erroneously provided by the userspace. As a result, the kernel no longer panics in the described scenario. (BZ#1629566)
Previously, a packet was missing the User Datagram Protocol (UDP)
payload checksum during a full checksum computation, if the hardware checksum was not applied. As a consequence, a packet with an incorrect checksum was dropped by a peer. With this update, the kernel includes the UDP payload checksum during the full checksum computation. As a result, the checksum is computed correctly and the packet can be received by the peer. (BZ#1635794)

Affected Products:

Red Hat Enterprise Linux Server – Extended Update Support 7.3 x86_64
Red Hat Enterprise Linux for IBM z Systems – Extended Update Support 7.3 s390x
Red Hat Enterprise Linux for Power, big endian – Extended Update Support 7.3 ppc64
Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64
Red Hat Enterprise Linux Server – AUS 7.3 x86_64
Red Hat Enterprise Linux for Power, little endian – Extended Update Support 7.3 ppc64le
Red Hat Enterprise Linux Server – TUS 7.3 x86_64
Red Hat Enterprise Linux Server (for IBM Power LE) – Update Services for SAP Solutions 7.3 ppc64le
Red Hat Enterprise Linux Server – Update Services for SAP Solutions 7.3 x86_64

漏洞危害

On successful exploitation it could allow an attacker to execute code.

解决方案

Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

Refer to Red Hat security advisory RHSA-2018:3591 to address this issue and obtain more information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

RHSA-2018:3591: Red Hat Enterprise Linux

0daybank

CVE-2017-18344 Red Hat Update for kernel (RHSA-2018:3540)

漏洞类别:RedHat漏洞等级: 

漏洞信息

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fixes: A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
kernel: out-of-bounds access in the show_timer function in kernel/time/posix-timers.c (CVE-2017-18344)
kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675)
kernel: Integer overflow in Linux’s create_elf_tables function (CVE-2018-14634)

Affected Products:

Red Hat Enterprise Linux Server – Extended Update Support 7.4 x86_64
Red Hat Enterprise Linux for Power, big endian – Extended Update Support 7.4 ppc64
Red Hat Enterprise Linux EUS Compute Node 7.4 x86_64
Red Hat Enterprise Linux Server – AUS 7.4 x86_64
Red Hat Enterprise Linux for IBM z Systems – Extended Update Support 7.4 s390x
Red Hat Enterprise Linux for Power, little endian – Extended Update Support 7.4 ppc64le
Red Hat Enterprise Linux Server – TUS 7.4 x86_64
Red Hat Enterprise Linux Server (for IBM Power LE) – Update Services for SAP Solutions 7.4 ppc64le
Red Hat Enterprise Linux Server – Update Services for SAP Solutions 7.4 x86_64

漏洞危害

On successful exploitation it could allow an attacker to execute code.

解决方案

Upgrade to the latest packages which contain a patch. Refer to Applying Package Updates to RHEL system for details.

Refer to Red Hat security advisory RHSA-2018:3540 to address this issue and obtain more information.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

RHSA-2018:3540: Red Hat Enterprise Linux

0daybank

百度美拍图片

百度美拍图片雷锋网AI研习社 AI投研邦 活动 专题 爱搞机

业界
人工智能
学术开发者
智能驾驶
AI+
金融科技
未来医疗
网络安全
智慧城市
智慧安防智慧教育智慧交通智慧社区智慧零售智慧政务
机器人
行业云
智能硬件
物联网
GAIR
业界专题正文
0

美拍之争:百度,你就从了美图秀秀吧
本文作者:林藠头 2013-04-02 17:02
导语:摘要:虽然都叫美拍,但一个是自拍的社区,一个是约炮的工具,若要说两者之间的竞合关系,应该是合大于竞。百度美拍就是一个让男用户只能过过眼瘾的应用,欲约炮而不得,而美拍则让美女更加“触手可及”,这两个应用的资源要是一打通,那就天下大同了。继百度与2月19日在iOS上推出
摘要:虽然都叫美拍,但一个是自拍的社区,一个是约炮的工具,若要说两者之间的竞合关系,应该是合大于竞。百度美拍就是一个让男用户只能过过眼瘾的应用,欲约炮而不得,而美拍则让美女更加“触手可及”,这两个应用的资源要是一打通,那就天下大同了。
继百度与2月19日在iOS上推出“百度美拍”之后,3月6日美图秀秀也发布了“美拍”,两个都叫“美拍”(为了区别,下文中“美拍”指美图秀秀的美拍),并且后来者居上,美拍从3月12日期已经在免费榜总榜上停留了十多天,现在也还在前三名。百度美拍的成绩相对而言就黯淡一些,倒显得先出来的百度美拍反而像东施效颦的那一个,这下百度美拍的人郁闷了。

不过,美拍也没什么值得太骄傲的。看图说话。

3月6号发布的美拍,10号还在总榜排名357,短短几天如有神助蹿升至第一。成绩实在是很耐人寻味。不过百度美拍也不落后,看下图。

百度美拍的历史排名,比较显著的变化是3月13号在摄影与录像类排名从60上升到17,而且如图中所示后期还有多次人品爆发的时候。

一般而言,两个都主打图片社交的而且恰好都叫“美拍”的应用之间应该存在激烈的竞争,但是有意思的是,这两者之间并不构成直接竞争。百度美拍,自称“美女自拍社区”,之前雷锋网(公众号:雷锋网)做过评测(见《百度美拍:“狼性”满满 全是“妹子”》),用一句简单的话来描述这个产品是做什么的:约炮,也就是一个工具应用。百度美拍虽然是主打妹子的,但由于某些原因男性用户非常多。

相对而言美拍就是一个纯洁的自拍应用,口号也是“发现身边的帅哥美女自拍照,可能是真实美女最多的社交App”,强调“身边”即LBS的作用,有想做成社区的意思。但是和美图秀秀本身的女性用户占了绝大多数一样,美拍的男女比例也是严重不协调,严重的阴盛阳衰,除了大姨吗还没有第二个社区可以在只有女人的情况下做成功过,美拍如果不想做成大姨吗就必须要改变现在的男女用户比例。

虽然叫一样的名字,但一个是自拍的社区,一个是约炮的工具,若要说两者之间的竞合关系,应该是合大于竞。新浪科技的报导里这样描述两者的差别:“百度美拍有意让最优质的那些能够不断得到强化,但不免会带来一定的距离感;而美拍不求集中反希望这些美女资源得以零散分布,并使之看起来更加‘触手可及’”,结合之前的分析,百度美拍就是一个让男用户只能过过眼瘾的应用,欲约炮而不得,而美拍上面则让美女更加“触手可及。”这两个应用的资源要是一打通,那就天下大同了。并且如上所述美拍也急需改变社区阴盛阳衰的状况。

一个需要女人的工具,一个需要男人的社区,真是天造地设的一对,不如你们就在一起吧。

百度美拍下载地址(iOS/Android)

美拍下载地址 iOS

雷锋网原创文章,未经授权禁止转载。详情见转载须知。

0人收藏 分享:
相关文章
自拍应用约炮百度美拍美拍

微软为iPhone开发自拍应用,用了高大上的机器学习

Twitter CFO推文暗示:将收购自拍应用Shots

自拍应用魔漫相机获阿里巴巴A轮融资

GoCam:手势控制自拍应用
文章点评:

我有话要说……
表情 同步到新浪微博 提交

林藠头
编辑

你先说有什么事,我好决定在不在。
发私信
当月热门文章
最新文章
谁是杀手?写在Gear VR消费者版之前的技术解析贴
2015年,看品胜的O2O大旗如何在行业挥舞
我们能从付费率70%的动漫公司身上学到什么?
全球无人机最大融资将在深圳艾特航空产生
除了换壳还有什么特殊?Apple Watch全解析
58阻击赶集IPO,谁是老姚的Mr.Key?
热门搜索
百度亚马逊DeepMindLBS华硕PS4小米手环中国联通Whatsapp健康数据挖掘
热门关键字
热门标签人工智能 机器人机器学习深度学习金融科技未来医疗智能驾驶自动驾驶计算机视觉激光雷达图像识别智能音箱区块链智能投顾医学影像物联网IoTCV微信小程序平台微信小程序在哪CES 2017CES2016年最值得购买的智能硬件2016 互联网小程序微信朋友圈抢票软件智能手机智能家居智能手环智能机器人智能电视360智能硬件智能摄像机智能硬件产品智能硬件发展智能硬件创业黑客白帽子大数据云计算新能源汽车无人驾驶无人机大疆小米无人机特斯拉VR游戏VR电影VR视频VR眼镜VR购物AR直播扫地机器人医疗机器人工业机器人类人机器人聊天机器人微信机器人微信小程序移动支付支付宝P2P区块链比特币风控高盛人脸识别指纹识别黑科技谷歌地图谷歌IBM微软乐视百度三星s8腾讯三星Note8 小米MIX小米Note华为小米阿里巴巴苹果MacBook ProiPhoneFacebookGAIRIROS双创周云栖大会优葩智能硬件公司智能硬件QQ红包支付宝红包敬业福人脸识别计蒜客谷歌地图vr中国移动流量卡ipad pencil人工智能 医疗多人视频会议热电技术2016中国新媒体趋势报告步态识别vertu ti法拉利小米概念机mix怎么样ansi流明和流明有什么区别ddos攻击的流量成本谷歌验证码更多
联系我们关于我们加入我们意见反馈投稿申请专栏作者
Copyright © 2011-2018 www.leiphone.com 雷锋网-移动互联网智能终端第一媒体 All Rights Reserved 粤ICP备11095991号-1 ICP证粤B2-20150332 0daybank

唐杨林

唐杨林智慧城市
雷锋网读懂智能&未来首页 AI研习社 AI影响因子 活动 专题 精选 爱搞机

业界人工智能智能驾驶AI+ Fintech&区块链未来医疗网络安全AR/VR机器人开发者智能硬件物联网GAIR
智能硬件正文
1

飞宇魏承赟:一个人的无人机江湖和他的九死一生
本文作者:六爷 2016-12-26 19:12
导语:创业是一件九死一生的事情;选择比努力更重要。这些话听上去就很悲壮和刺激。
雷锋网按:有两句话在创业者中流传甚广,创业是一件九死一生的事情;选择比努力更重要。听上去就很悲壮和刺激。可现实往往不按套路出牌,看似同一个模子里刻出来的创业公司,背后都隐藏着鲜为人知的细节。来自广西的飞宇便是其中之一。

飞宇魏承赟:一个人的无人机江湖和他的九死一生

背叛

一天晚上,魏承赟接到供应商电话,对方问他:“电机材料你们还要不要?”魏一时没反应过来:“要啊,为什么不要,我们都快量产了。”对方说:“你们内部可能出了一些问题,你再去确认下吧。”说完便把电话给挂了。魏随即给项目部的几个人打电话,都无人接听,他有点懵,脑子里闪过一个念头,“可能出事了。”

第二天是周六,那天本来不用上班,魏来到公司,只看到了加班的林姐,研发部的座位收拾得很干净,连之前的样品都不见了。魏问林姐,“研发部这几个人昨天有没有加班?”林姐说:“有,我昨天也在加班,当时他们收拾东西,我还问他们要干什么,他们说有一些东西要拿回家去做,然后张烨(化名)开了一辆面包车过来,把那些东西都拉走了。”

这批人估计是留不住了,魏承赟心想。

最早是 2014 年年初,有个研发骨干提出要辞职,魏当时还很诧异,因为公司刚推出两轴的手持云台,卖得很好,三轴的也很快就要出来,“马上大家就可以享受成果了。”但对方似乎有很多顾虑,东拉西扯的理由很多。

说到底,还是为了钱。不过魏承赟并不觉得这是个问题,“创业公司赚了钱,多发点给大家也是应该的。”最后,他也答应了对方提出的“将 30% 的净利润分给研发团队”这一要求,暂时把人留住了。

周一,魏承赟终于见到了自己的研发团队,毫不令人意外,他们集体递交了辞呈。

那天晚上,魏和合伙人李全在公司聊到很晚,他说:“这几个人我留不住,也不太想留了,但这个项目怎么弄?”两人的情绪都很低落。事有蹊跷,但他们都不知道问题出在哪里。

离开公司前,魏承赟看到一个研发人员的电脑没关,屏幕上 QQ 在闪,本来想一关了之,但他没压制住心中的好奇。打开聊天记录,对话中赫然写着,“老板太天真了。”

如今再谈及此事,魏依然愤懑,“几个人早就商量好了,股份怎么分配都聊完了,他们跟我们的一些客户有接触,在外面自己还开了一套模具,公司干了一套,自己家里干一套,而且下完班以后,几个人聚在其中一个人住的地方,一起继续工作。”

这还不是最恶劣的,魏后来发现,当他们准备好另立门户时,并没有想过给公司留一条活路,“在公司做的好多东西都存在网盘上,聊天记录里一个人对另一个人说,记得把那些东西都删掉,另一个人说我都已经删掉了,删完再用文件粉碎器删了一遍。”

看到这些,魏承赟彻底绝了有话好说的心思。

创业

魏承赟上一份工作要追溯到 2006 年,主动辞职,被动创业。

那时候有人找他做一个纯陀螺仪的飞控系统,对方是事业单位,走账需要他要么挂靠一个公司,要么成立一个公司,最终他选择了后者,成立飞宇。很长一段时间内,飞宇只有魏一个人,也只有一个项目,所以他对创业的理解非常模糊,准确的讲,意识到这点还是从许久后的一个电话开始的。

那天魏在睡觉,一个自称税务局的人打来电话问他:“你怎么不来报税?”魏说:“要报税吗?报什么税?我都没有交易,就一个人。”税务局的人很不耐烦:“没有交易你也要零申报,赶快来吧,你已经超时了。”赶到税务局,魏才发现要填各种莫名其妙的表格,末了,工作人员不无鄙视地说:“你啥也不懂,还开什么公司。”魏一时语塞。

后来魏花 200 块钱找了个财务处理琐碎的事情,但这番遭遇并没有让他产生将公司带向正轨的冲动,而直到他想做的事情超出自己的边界时才想到去招一个人。

做飞控系统的时候,魏就意识到一点:这款产品结合了飞行的特性和陀螺仪的特性,如果说有一个飞控系统能把飞行的姿态完全测量出来,那性能绝对是很大的提高,控制方式就会更直接、更简单、更稳定。

当时他看了很多论文和方案,其中一个外国网站的产品与他的想法不谋而合,“那个网站专门出那种惯性姿态模块,可以测量运动姿态,但卖得很贵,2、3万块钱一个,国内也有人把那个模块买回来,去组成自己的一个飞控系统,代价很高。”

所以魏当时的想法就是,“能不能自己做一个惯性姿态模块,把成本降下来,卖给对稳定有需求的人,或者说把模块卖给想做无人机飞控的人。”

当时大疆也在做同样的事情,比飞宇早一年,方向也略有不同,大疆做的是直升机飞控,飞宇做的是固定翼飞控。问及为何有这种差别,魏的回答令人莞尔:“不是我们不做直升机,而是我们不懂直升机,固定翼我是会玩这个,所以我知道该怎么搞。”

“那大疆不做固定翼是因为汪滔不会玩吗?”雷锋网问。“汪滔应该很会玩固定翼,但直升机应该更有前景。”换句话说,当魏二选一的时候,他很清楚自己擅长什么,也很清楚自己错过了什么。

魏承赟第一次听说大疆是在 2008 年,他当时在深圳帮一个朋友做飞控,去机场的路上朋友问他:“你知不知道在深圳南山那里有一伙人在搞直升机的飞控?”魏摇头,回问:“他们搞得怎么样?”朋友跟他说:“搞的还行,但是他们挺困难的,感觉有点搞不下去了。”过了很久,魏才意识到朋友说的“那伙人”就是大疆。

选择

魏承赟确定要做手持云台是在 2013 年 5 月见完雷军之后。当时的小米在到处抢项目,魏还在折腾无人机。小米唐杨林是一个资深无人机玩家,也是魏的朋友,这次见面便是他引荐的。

“2013 年正是小米如日中天的时候,”魏承赟表示当时去北京是一种朝圣的心情。在办公室里,雷军向他展示了还未发布的小米电视,谈工艺,谈愿景,还问他今后想做什么?他告诉雷军,自己想做一个手机遥控的多旋翼无人机,类似于 Parrot 的 AR.Drone,雷军说,“好,你好好做这个,要是缺钱,你来找我。”并让他第二天去见见顺为的人。

来北京之前,魏承赟就想过,“雷总投我几百万的话,我自己有,如果投多了,他应该也不会投,”所以这件事他并没有太在放心上,聊完后便和唐杨林一起找蔡炜吃饭去了。

当时他们都未意识到,这顿饭基本上决定了两家公司的走向。

魏对唐杨林说:“要不然我做一个云台,能挂手机,跟你们结合度比较高,市场容量可能也会比较大,解决了摄像稳定的问题。”唐杨林当即表示:“你这个想法不错。”而蔡炜当时还是魏承赟的经销商,当他得知魏承赟第二天要去见顺为的人,便问:“我明天能不能跟你一起去?”魏说:“行。”

从北京回去之后,魏承赟便从公司拨出了一帮人研究手持云台,与顺为几乎断掉了联系;蔡炜则组织一帮人去做无人机,并顺利拿到小米投资成立了飞米,推出了第一代小米无人机。

节点

2012 年发生了很多大事,大疆出禅思是其中之一。

“禅思云台确实把大家给震住了,”作为前航拍从业者,大木对此心有余悸,“我们那时候一天(航拍)收 2 万、3 万,买了禅思的人一天收 5000,拍的还差不多,你说怎么搞?我们那玩意儿还怕风,说直升机是自己做的,一上去根本比不过别人,我那个搭档跟汪滔是好朋友,后来汪滔就跟他说,你不要搞这个航拍了,没有前途,你们这些肯定会被我全干死的。”

“后来呢?”雷锋网问。

“后来我们就信了,去找了一个行业应用,搞植保无人机去了,喷农药啥的。”大木笑道。

横财也有,但不好赚。当时有一家叫斯道拉恩索的芬兰林业巨头找上了大木的航拍团队,一平方公里给 2000 块钱,理想状态下一天能飞 50 平方公里,也就是说一天能赚 10 万。结果在广西北海合浦县一个叫棺材岭村的地方,无人机落地的时候砸断了当地村民的三根甘蔗,“那些人直接拿枪指着我的头,叫了一村的人过来,吓死我了。”大木回忆道。

从 2009 年到 2013 年,飞宇完成了一个非常重要的工作,就是做整机方案。“主要是面向测绘,就是一个泡沫飞机下面挂一个微单,这个微单往下拍照片,拍一张照片记录一个 GPS 值,然后把这些 GPS 和照片输入到电脑里面,出来一张地图。”

这正是大木当时需要的服务,“当时国内做固定翼飞控好的就两家,一家是的杨建军的零度,一家是飞宇。但是老杨的东西不同批次质量不稳定,飞着飞着飞机就丢了,相机也丢了,一丢就是好几万,给他们打电话,他们就教育我,你这个东西没有飞好,我产品没问题,给魏总打电话,魏总就会要看看数据,看这个东西到底是怎么回事儿,所以飞宇的售后比较好。”

大木和魏承赟本来就有共同的朋友,再加上业务上的来往,两个人很快就熟络起来。至于一起共事,那是后话,因为那时候魏还忙着从别人挖的坑里爬出来。

输赢

看完聊天记录,魏承赟心中五味杂陈,他没想过自己以诚待人,却被人当成了傻子。连续几晚睡不着觉,心中的傲气也被激发了出来:“看完聊天记录,我就跟李全讲了一句,即使无人机项目不干了,我也要把云台这个东西给做好。”

原来的方案也不要了,魏和李二人用两个月时间重写了一个方案,“那个方案跟原来的完全不一样,而且更简洁,更简单,性能更好。”

2014 年飞宇出第一款两轴手持云台的时候,魏分别给大木和唐杨林寄了一个,大木觉得产品不太好,当时就没吭声,唐杨林则很直接:“这个太难看了,都不好意思拿给雷总看。”直到三轴手持云台出来,大木才坐不住了,“我们搞航拍的很明白两轴和三轴的区别有多大,然后我就花快 3000 块钱买了一个 GoPro 用了一下,一用我觉得这个东西还挺牛逼的。”

两轴到三轴的难度远非数字差异那么轻巧,另外,由于角度范围大幅扩大,三轴手持云台的难度又比无人机三轴云台高很多,“手持拍摄的时候,横滚轴容易变成俯仰轴,俯仰轴又容易变成横滚轴,不同的角度电机转动量等各方面都不一样,怎样让它们无缝切换,我们做了很多研究。要是光加一个电机,稳定一下航向轴就这么挂着,那没啥意义,无人机上用的就是这个。”

市场是证明产品不二之选,但魏的尴尬是,消费者压根就没见过这种东西,所以,他很快想到了大木。

为了拉大木入伙,魏把他叫来桂林玩,跟他说:“这个东西要做大众消费品,就要有人去‘忽悠’、推广,我觉得你特别合适。”难点在于这种产品当时还没人用过。

“你们量产的时候,市面上找不到其他的手持云台?”雷锋网问,大木说:“不能说基本上没有,是完全没有。除了一堆 Demo。”

一开始,大木想从综艺节目那里打开局面,便给湖南卫视谢涤葵的团队赞助了一些设备,谢是《爸爸去哪儿》的总导演,所以在这档现象级的综艺节目中,不时能看到飞宇手持稳定器的身影。不过这还不是大木加入飞宇之后最有成就感的事情。

手持云台市场的升温很快引起了苹果公司的注意,2015 年上半年,海外反响良好的飞宇因此进入了苹果的视野。

大木告诉雷锋网:“苹果这种跨国巨头选择合作伙伴不会只找一家,全世界范围内有能力批量做出同类型产品的企业都要找过来挨个试,谁通过测试谁上,同时苹果充分尊重知识产权保护和原创性,有知识产权的就会受到足够保护。”

对飞宇来说,这件事情的成与败被赋予了多层意义。

一方面,苹果不是 Gopro 那样的合作伙伴,后者与飞宇实际上接触更早,但在魏承赟看来,“我跟汪老板对他们的感觉差不多,Gopro 就觉得你是一个工厂,跟你合作你挣点血汗钱就行了,报一下 BOM 成本,再留百分之多少的利润,技术含量各方面的东西都不在乎,觉得你这个完全没有附加值。苹果的话,它首先会认可你是一个品牌,很尊重你。”

另一方面,在苹果找的七八家同品类厂商中,有一家就是出走公司的那批人,“所以这件事事关公司在业内的声誉,一定不能输。”

压力与兴奋共存,经过了半年折腾,飞宇的产品最终摆上了苹果的货架。

后记

刚毕业时,魏承赟就想过去深圳发展,但后来无论是工作还是创业,他都留在了桂林,原因很简单,“当时的女朋友还在桂林读书。”再后来,女朋友变成了妻子,“安家之后就更没那么洒脱了。”

从业十多年,魏很清楚深圳对一个电子消费品厂商来说意味着什么,但他还是算不清楚这中间的得失,似乎这些事也没有被计算的价值。

所以,在与雷锋网(公众号:雷锋网)的整个交流过程中,魏一直很平静,唯一一次例外还是那次背叛,“我这个人容易心软,把整个项目全部重写后比原来还好,所以心情也挺好,但如果今天谁再敢干这样的事,我非他妈整死他。”魏承赟说。

雷锋网原创文章,未经授权禁止转载。详情见转载须知。

飞宇魏承赟:一个人的无人机江湖和他的九死一生
3人收藏 分享:
相关文章
飞宇手持云台大疆小米无人机魏承赟

iPhone手持稳定器厂商告诉你:入驻苹果直营店有多难 …

大疆发布首款单反相机单手手持云台|CES 2018

GoPro发布手持云台,无人机重新上市依然遥遥无期

3199元,零度智控推出“便携式”手持云台相机
文章点评:

我有话要说……
表情 同步到新浪微博 提交
最新评论

Nikola1 01月09日 18:47
员工能干出这种事。老板没问题
回复 (0)

六爷
编辑

发私信
当月热门文章
最新文章
Cadence公布人工智能芯片Tensilica DNA 100,性能提升4.7倍,能耗比提升2.3倍
OPPO Find X 背后的独角兽,奥比中光的进化之路才刚刚开始
发力机器人平台,NVIDIA再秀次世代AI芯片Jetson Xavier
复古独立不跟随,猫王新品发布会现场
2018世界机器人大会召开在即,展会规模和参展人数创历史新高
Segway-Ninebot发布平衡轮W1和卡丁改装套件
热门搜索
亚马逊雷锋网网络安全中国软银通用PS4iOS 7松下Cortana一加
热门关键字
热门标签人工智能 机器人机器学习深度学习金融科技未来医疗智能驾驶自动驾驶计算机视觉激光雷达图像识别智能音箱区块链智能投顾医学影像物联网IoTCV微信小程序平台微信小程序在哪CES 2017CES2016年最值得购买的智能硬件2016 互联网小程序微信朋友圈抢票软件智能手机智能家居智能手环智能机器人智能电视360智能硬件智能摄像机智能硬件产品智能硬件发展智能硬件创业黑客白帽子大数据云计算新能源汽车无人驾驶无人机大疆小米无人机特斯拉VR游戏VR电影VR视频VR眼镜VR购物AR直播扫地机器人医疗机器人工业机器人类人机器人聊天机器人微信机器人微信小程序移动支付支付宝P2P区块链比特币风控高盛人脸识别指纹识别黑科技谷歌地图谷歌IBM微软乐视百度三星s8腾讯三星Note8 小米MIX小米Note华为小米阿里巴巴苹果MacBook ProiPhoneFacebookGAIRIROS双创周云栖大会优葩智能硬件公司智能硬件QQ红包支付宝红包敬业福vr相机原理hud小米adobe 发布会人工智能 招聘川普获胜iphone7plus双摄像头有什么用2015淘宝双十一销售额智能车锁makey makey人工智能 金融growth hacker仓储机器人学编程序kindle 怎么用更多
联系我们关于我们加入我们意见反馈投稿
Copyright © 2011-2018 www.leiphone.com 雷锋网-移动互联网智能终端第一媒体 All Rights Reserved 粤ICP备11095991号-1 ICP证粤B2-20150332 0daybank

亚航失联客机

亚航失联客机雷锋网AI研习社 AI投研邦 活动 专题 爱搞机

业界
人工智能
学术开发者
智能驾驶
AI+
金融科技
未来医疗
网络安全
智慧城市
智慧安防智慧教育智慧交通智慧社区智慧零售智慧政务
机器人
行业云
智能硬件
物联网
GAIR
业界专题正文
1

关于亚航客机失联你需要知道的五大事实
本文作者:刘芳平 2014-12-28 15:27
导语:今年大概是马来西亚的不祥之年,继之前马航失联事件和击落事件之后,又一家马来西亚的国有航空公司——亚洲航空的一架A320客机今早在印尼飞往新加坡的过程中发生失联事件。
关于亚航客机失联你需要知道的五大事实

今年大概是马来西亚的不祥之年,继之前马航失联事件和击落事件之后,又一家马来西亚的国有航空公司——亚洲航空的一架A320客机今早在印尼飞往新加坡的过程中发生失联事件。

下面关于此次事件的五个最新消息:

一、飞机失联时正飞跃爪哇海
亚航在发布的声明中确认,QZ8501航班从印尼泗水飞往新加坡,在飞跃爪哇海与雅加达的塔台失去联系,事件发生于当地时间早间7点23分,大约是预定降落时间8点30分前一个小时。这架空客A320-200的注册号是PK-AXC。

关于亚航客机失联你需要知道的五大事实

航空公司表示对于乘客和机组人员“没有更多的消息”。

二、搜索和救援行动正在展开
亚航在声明中表示,目前搜索和救援行动正在展开,亚航对救援行动予以全力的配合和帮助。亚航还为航班乘客的亲友设立了紧急热线,号码是+622129850801。

就在声明发表后不久,亚航将自家的社交媒体账号头像改成了黑白色。

关于亚航客机失联你需要知道的五大事实

三、飞机上有162人,没有中国公民
亚航在声明中表示失联飞机上有155位乘客,包括两名飞行员和5名乘务人员。乘客的国籍分别是:

1位新加坡

1位马来西亚

1位法国

3位韩国

156位印尼

亚航表示机长拥有6100小时的飞行经验,副机长飞行时长为2275小时。

航空记者Omni Flyers发布Tweet贴出了航班的信息,发现人员中包括16名未成年人,1名幼儿。

四、飞机已知的最后位置在勿里洞岛附近
关于亚航客机失联你需要知道的五大事实

飞机已知的最后一个位置在爪哇海上的勿里洞岛附近。

航空记者John Walton发布Tweet贴出了飞机的一些信息,显示这架飞机机龄为6.3年。

关于亚航客机失联你需要知道的五大事实

五、因天气原因,飞行员曾请求更改飞行路线
亚航表示飞行员曾请求更改飞行路线,理由是该地出现恶劣天气。

关于亚航客机失联你需要知道的五大事实

该地区目前正处于雨季,雷达显示在飞行过程中该地区出现雷暴。

五个月之前,马来西亚航空公司的一架客机在乌克兰东部被支持俄罗斯的反叛者击落。九个月前,另一架马航客机在印度洋上空失联,并再未找到。

亚洲航空公司(AirAsia),简称亚航,成立于2001年。是马来西亚第二家国际航空公司,也是亚洲地区首家低成本航空。

雷锋网原创文章,未经授权禁止转载。详情见转载须知。

0人收藏 分享:
相关文章
亚航失联A320马来西亚亚航客机失联马航

马航官网今日被黑,部分乘客信息被窃

Linux创始人:面对闰秒,我们只需喝杯酒

为什么我们仍然连一架飞机都追踪不了?

又一失联事件,亚航一架A320失联
文章点评:

我有话要说……
表情 同步到新浪微博 提交
最新评论

坚强的泡沫_leiphone 12月29日 08:16
估计与美国报道的太阳耀斑爆发有关系吧。。。
回复 (0)

刘芳平
编辑

微信:liu_fangping
发私信
当月热门文章
骁龙 855 全揭秘:拳打苹果 A12,脚踢麒麟 980
抢三星首发!荣耀发布屏下摄像头技术,屏幕不开孔
5G来了!高通发布全新旗舰骁龙 855
最新文章
谁是杀手?写在Gear VR消费者版之前的技术解析贴
2015年,看品胜的O2O大旗如何在行业挥舞
我们能从付费率70%的动漫公司身上学到什么?
全球无人机最大融资将在深圳艾特航空产生
除了换壳还有什么特殊?Apple Watch全解析
58阻击赶集IPO,谁是老姚的Mr.Key?
热门搜索
iPad3D打印激光雷达汽车中兴科技创业公司移动医疗苏宁央行Galaxy
热门关键字
热门标签人工智能 机器人机器学习深度学习金融科技未来医疗智能驾驶自动驾驶计算机视觉激光雷达图像识别智能音箱区块链智能投顾医学影像物联网IoTCV微信小程序平台微信小程序在哪CES 2017CES2016年最值得购买的智能硬件2016 互联网小程序微信朋友圈抢票软件智能手机智能家居智能手环智能机器人智能电视360智能硬件智能摄像机智能硬件产品智能硬件发展智能硬件创业黑客白帽子大数据云计算新能源汽车无人驾驶无人机大疆小米无人机特斯拉VR游戏VR电影VR视频VR眼镜VR购物AR直播扫地机器人医疗机器人工业机器人类人机器人聊天机器人微信机器人微信小程序移动支付支付宝P2P区块链比特币风控高盛人脸识别指纹识别黑科技谷歌地图谷歌IBM微软乐视百度三星s8腾讯三星Note8 小米MIX小米Note华为小米阿里巴巴苹果MacBook ProiPhoneFacebookGAIRIROS双创周云栖大会优葩智能硬件公司智能硬件QQ红包支付宝红包敬业福韩路芯片“松果”李航 华为诺亚方舟小米手机4机器人管家vr看黄片苹果首席设计师支付宝转自己银行卡收费吗何凯明博士微信小程序 demovive 分辨率柔性显示器玩具机器人material design ui树莓派用win10能干嘛更多
联系我们关于我们加入我们意见反馈投稿申请专栏作者
Copyright © 2011-2018 www.leiphone.com 雷锋网-移动互联网智能终端第一媒体 All Rights Reserved 粤ICP备11095991号-1 ICP证粤B2-20150332 0daybank