+ RHSA-2013:1732 Low: busybox security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1732.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1813
+ RHSA-2013:1553 Important: qemu-kvm security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1553.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4344
+ RHSA-2013:1635 Low: pacemaker security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1635.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0281
+ RHSA-2013:1645 Important: Red Hat Enterprise Linux 6 kernel update
http://rhn.redhat.com/errata/RHSA-2013-1645.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6542
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6545
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1928
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1929
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2851
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2889
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2892
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4345
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4591
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4592
+ RHSA-2013:1605 Moderate: glibc security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1605.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332
+ RHSA-2013:1615 Moderate: php security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1615.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248
+ RHSA-2013:1582 Moderate: python security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1582.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238
+ RHSA-2013:1542 Moderate: samba security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1542.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
+ RHSA-2013:1536 Moderate: libguestfs security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1536.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4419
+ RHSA-2013:1620 Low: xorg-x11-server security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1620.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940
+ RHSA-2013:1569 Moderate: wireshark security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1569.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3825
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6056
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6059
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6060
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6061
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6062
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4936
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721
+ RHSA-2013:1591 Low: openssh security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1591.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5107
+ RHSA-2013:1537 Low: augeas security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1537.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0787
+ RHSA-2013:1701 Low: sudo security, bug fix and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1701.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777
+ RHSA-2013:1661 Moderate: RDMA stack security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1661.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2561
+ RHSA-2013:1540 Low: evolution security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1540.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4166
+ RHSA-2013:1543 Moderate: samba4 security and bug fix update
http://rhn.redhat.com/errata/RHSA-2013-1543.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124
+ RHSA-2013:1652 Low: coreutils security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1652.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223
+ RHSA-2013:1674 Moderate: dracut security, bug fix, and enhancement update
http://rhn.redhat.com/errata/RHSA-2013-1674.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4453
+ RHSA-2013:1752 Important: 389-ds-base security update
http://rhn.redhat.com/errata/RHSA-2013-1752.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4485
+ libpng 1.6.7 released
http://www.libpng.org/pub/png/src/libpng-1.6.7-README.txt
+ Linux Kernel IPVS Stack Overflows Let Local Users Gain Elevated Privileges
http://www.securitytracker.com/id/1029371
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4588
+ Apple MacOSX 10.9 Hard Link Memory Corruption
http://cxsecurity.com/issue/WLB-2013110059
Advisory: Windows 8.1 and Windows Server 2012 R2 - support for Sophos products
http://www.sophos.com/en-us/support/knowledgebase/119957.aspx
Intelligent Converters released PostgreSQL-to-MSSQL and MSSQL-to-PostgreSQL converters
http://www.postgresql.org/about/news/1490/
賞金総額3000万円のコンテストでモバイル機器の弱点を洗い出す
米ヒューレットパッカード エンタープライズ・セキュリティ・プロダクツ 脆弱性リサーチ部門ゼロデイイニシアティブ(ZDI)マネジャー
ブライアン・ゴーレンス氏
http://itpro.nikkeibp.co.jp/article/Interview/20131120/519427/?ST=security
エアー、eディスカバリーを強化した新版メールアーカイバー「WISE Audit V6.0」を発表
http://itpro.nikkeibp.co.jp/article/NEWS/20131121/519725/?ST=security
国内の企業を狙う標的型攻撃が出現、Officeのゼロデイ脆弱性を悪用
http://itpro.nikkeibp.co.jp/article/NEWS/20131121/519564/?ST=security
0 件のコメント:
コメントを投稿