2026年3月27日金曜日

27日 金曜日、仏滅

+ RHSA-2026:5971 Important: Satellite 6.16.7 Async Update
https://access.redhat.com/errata/RHSA-2026:5971
CVE-2025-6176
CVE-2025-14550
CVE-2025-68121
CVE-2026-0980
CVE-2026-1207
CVE-2026-1285
CVE-2026-1287
CVE-2026-1312
CVE-2026-1530
CVE-2026-1531
CVE-2026-1961

+ RHSA-2026:5932 Important: firefox security update
https://access.redhat.com/errata/RHSA-2026:5932
CVE-2026-4684
CVE-2026-4685
CVE-2026-4686
CVE-2026-4687
CVE-2026-4688
CVE-2026-4689
CVE-2026-4690
CVE-2026-4691
CVE-2026-4692
CVE-2026-4693
CVE-2026-4694
CVE-2026-4695
CVE-2026-4696
CVE-2026-4697
CVE-2026-4698
CVE-2026-4699
CVE-2026-4700
CVE-2026-4701
CVE-2026-4702
CVE-2026-4704
CVE-2026-4705
CVE-2026-4706
CVE-2026-4707
CVE-2026-4708
CVE-2026-4709
CVE-2026-4710
CVE-2026-4711
CVE-2026-4712
CVE-2026-4713
CVE-2026-4714
CVE-2026-4715
CVE-2026-4716
CVE-2026-4717
CVE-2026-4718
CVE-2026-4719
CVE-2026-4720
CVE-2026-4721

+ RHSA-2026:5970 Important: Satellite 6.17.7 Async Update
https://access.redhat.com/errata/RHSA-2026:5970
CVE-2025-6176
CVE-2025-14550
CVE-2025-68121
CVE-2026-0980
CVE-2026-1207
CVE-2026-1285
CVE-2026-1287
CVE-2026-1312
CVE-2026-1530
CVE-2026-1531
CVE-2026-1961
CVE-2026-4324

+ RHSA-2026:5968 Important: Satellite 6.18.4 Async Update
https://access.redhat.com/errata/RHSA-2026:5968
CVE-2025-61726
CVE-2025-61729
CVE-2025-68121
CVE-2026-0980
CVE-2026-1531
CVE-2026-1961
CVE-2026-4324

+ RHSA-2026:5942 Important: golang security update
https://access.redhat.com/errata/RHSA-2026:5942
CVE-2025-61731
CVE-2026-25679

+ RHSA-2026:5930 Important: firefox security update
https://access.redhat.com/errata/RHSA-2026:5930
CVE-2026-4684
CVE-2026-4685
CVE-2026-4686
CVE-2026-4687
CVE-2026-4688
CVE-2026-4689
CVE-2026-4690
CVE-2026-4691
CVE-2026-4692
CVE-2026-4693
CVE-2026-4694
CVE-2026-4695
CVE-2026-4696
CVE-2026-4697
CVE-2026-4698
CVE-2026-4699
CVE-2026-4700
CVE-2026-4701
CVE-2026-4702
CVE-2026-4704
CVE-2026-4705
CVE-2026-4706
CVE-2026-4707
CVE-2026-4708
CVE-2026-4709
CVE-2026-4710
CVE-2026-4711
CVE-2026-4712
CVE-2026-4713
CVE-2026-4714
CVE-2026-4715
CVE-2026-4716
CVE-2026-4717
CVE-2026-4718
CVE-2026-4719
CVE-2026-4720
CVE-2026-4721

+ Google Chrome 147.0.7727.24/.25 released
https://chromereleases.googleblog.com/2026/03/early-stable-update-for-desktop_25.html

+ Mozilla Thunderbird 149.0 released
https://www.thunderbird.net/en-US/thunderbird/149.0/releasenotes/

ISC BIND 9.20.21, 9.18.47 released
https://downloads.isc.org/isc/bind9/9.20.21/doc/arm/html/notes.html
https://downloads.isc.org/isc/bind9/9.18.47/doc/arm/html/notes.html

+ FreeBSD-SA-26:09.pf pf silently ignores certain rules
https://www.freebsd.org/security/advisories/FreeBSD-SA-26:09.pf.asc
CVE-2026-4748

+ FreeBSD-SA-26:08.rpcsec_gss Remote code execution via RPCSEC_GSS packet validation
https://www.freebsd.org/security/advisories/FreeBSD-SA-26:08.rpcsec_gss.asc
CVE-2026-4747

+ FreeBSD-SA-26:07.nvmf Remote denial of service via null pointer dereference
https://www.freebsd.org/security/advisories/FreeBSD-SA-26:07.nvmf.asc
CVE-2026-4652

+ FreeBSD-SA-26:06.tcp TCP: remotely exploitable DoS vector (mbuf leak)
https://www.freebsd.org/security/advisories/FreeBSD-SA-26:06.tcp.asc
CVE-2026-4247

+ libpng 1.6.56 released
https://www.libpng.org/pub/png/src/libpng-1.6.56-README.txt

+ BIND 9の脆弱性(High: CVE-2026-1519, CVE-2026-3104, Medium: CVE-2026-3119, CVE-2026-3591)と9.18.47, 9.20.21, 9.21.20のリリース
https://security.sios.jp/vulnerability/bind-security-vulnerability-20260326/
CVE-2026-1519
CVE-2026-3104
CVE-2026-3119
CVE-2026-3591

JVN#08057419 RATOC RAID監視マネージャー(Windows用)のインストーラーにおける複数の脆弱性
https://jvn.jp/jp/JVN08057419/index.html

JVN#18035227 デジタルフォトフレームGH-WDF10Aにおけるアクセス制限不備の脆弱性
https://jvn.jp/jp/JVN18035227/index.html

JVN#49524110 シャープ製ルーター製品における一部のweb APIに対する認証欠如の脆弱性
https://jvn.jp/jp/JVN49524110/index.html

JVNVU#90028062 複数のSchneider Electric製品における複数の脆弱性
https://jvn.jp/vu/JVNVU90028062/index.html

JVNVU#90049616 Pharos Controls製Mosaic Show Controllerにおける重要な機能に対する認証の欠如の脆弱性
https://jvn.jp/vu/JVNVU90049616/index.html

JVNVU#90164248 Grassroots製Grassroots DICOM(GDCM)におけるメモリ解放の欠如の脆弱性
https://jvn.jp/vu/JVNVU90164248/index.html

JVNVU#90382996 LibreChat RAG APIにおけるログインジェクションの脆弱性
https://jvn.jp/vu/JVNVU90382996/index.html

JVNVU#99483706 複数の三菱電機製家電製品に搭載されているRealtek社製チップ向けWi-Fiドライバにおけるヒープベースのバッファオーバーフローの脆弱性
https://jvn.jp/vu/JVNVU99483706/index.html

JVN#19505323 OM Workspace(Windows版)のインストーラにおけるDLL読み込みに関する脆弱性
https://jvn.jp/jp/JVN19505323/index.html

JVN#90835713 山洋電気製SANUPS SOFTWAREにおける引用符で囲まれていないファイルパスの脆弱性
https://jvn.jp/jp/JVN90835713/index.html

JVNVU#99179109 複数のWHILL電動車椅子におけるBluetooth接続に関する認証不備の脆弱性
https://jvn.jp/vu/JVNVU99179109/index.html

日経NETWORK 特別リポート
フィッシング時代のアカウント防衛術
被害に遭っても補償は当たり前でない
https://xtech.nikkei.com/atcl/nxt/mag/nnw/18/041800013/031700101/?ST=nxt_thmit_security

日経コンピュータ 勝村幸博の「今日も誰かが狙われる」
1年で90件の脆弱性を悪用 「ゼロデイ攻撃」の危険な現状
https://xtech.nikkei.com/atcl/nxt/mag/nc/18/052100113/032500182/?ST=nxt_thmit_security

北郷達郎のテクノロジー温故知新
デジタルオタクなシニア記者、デカく低スペックなガラホに「安心感」を抱く
https://xtech.nikkei.com/atcl/nxt/column/18/02598/031800031/?ST=nxt_thmit_security

成功を生む「営業改革」の教科書 第1回
営業組織が危機に陥っている最大の要因とは?
https://xtech.nikkei.com/atcl/nxt/column/18/03529/030500002/?ST=nxt_thmit_security

月刊ランサムリポート 第16回
総被害件数が1000件を突破、日本でも猛威 26年2月のランサム被害を分析
https://xtech.nikkei.com/atcl/nxt/column/18/03053/032400017/?ST=nxt_thmit_security

NEWS close-up
社長をかたる「CEO詐欺」が猛威
被害は6億円を超え6000社以上に偽メール BECの「弱点」が解消され攻撃者がシフト
https://xtech.nikkei.com/atcl/nxt/mag/nnw/18/041800012/031700318/?ST=nxt_thmit_security

2026年3月25日水曜日

25日 水曜日、友引

+ RHSA-2026:5588 Moderate: python3 security update
https://access.redhat.com/errata/RHSA-2026:5588
CVE-2025-0938

+ RHSA-2026:5585 Moderate: gnutls security update
https://access.redhat.com/errata/RHSA-2026:5585
CVE-2025-9820
CVE-2025-14831

+ RHSA-2026:5587 Moderate: opencryptoki security update
https://access.redhat.com/errata/RHSA-2026:5587
CVE-2026-23893

+ RHSA-2026:5581 Moderate: nginx:1.24 security update
https://access.redhat.com/errata/RHSA-2026:5581
CVE-2026-1642

+ RHSA-2026:5580 Moderate: mysql:8.0 security update
https://access.redhat.com/errata/RHSA-2026:5580
CVE-2026-21936
CVE-2026-21937
CVE-2026-21941
CVE-2026-21948
CVE-2026-21964
CVE-2026-21968

+ RHSA-2026:5578 Moderate: virt:rhel and virt-devel:rhel security update
https://access.redhat.com/errata/RHSA-2026:5578
CVE-2025-11234

+ RHSA-2026:5513 Moderate: 389-ds:1.4 security update
https://access.redhat.com/errata/RHSA-2026:5513
CVE-2025-14905

+ RHSA-2026:5640 Moderate: mysql:8.4 security update
https://access.redhat.com/errata/RHSA-2026:5640
CVE-2026-21936
CVE-2026-21937
CVE-2026-21941
CVE-2026-21948
CVE-2026-21964
CVE-2026-21968

+ RHSA-2026:5599 Moderate: nginx security update
https://access.redhat.com/errata/RHSA-2026:5599
CVE-2026-1642

+ RHSA-2026:5602 Moderate: vim security update
https://access.redhat.com/errata/RHSA-2026:5602
CVE-2026-25749

+ RHSA-2026:5603 Moderate: opencryptoki security update
https://access.redhat.com/errata/RHSA-2026:5603
CVE-2026-23893

+ About the security content of iOS 26.4 and iPadOS 26.4
https://support.apple.com/en-us/126792
CVE-2026-28865
CVE-2026-28877
CVE-2026-28895
CVE-2026-28879
CVE-2026-28822
CVE-2026-28874
CVE-2026-28875
CVE-2026-28894
CVE-2026-28866
CVE-2026-20690
CVE-2026-28886
CVE-2026-28878
CVE-2025-14524
CVE-2026-28876
CVE-2026-28870
CVE-2026-28880
CVE-2026-28833
CVE-2025-64505
CVE-2026-28868
CVE-2026-28867
CVE-2026-20698
CVE-2026-20687
CVE-2026-28882
CVE-2026-20692
CVE-2026-20688
CVE-2026-28863
CVE-2026-28864
CVE-2026-28856
CVE-2026-28858
CVE-2026-28852
CVE-2026-20665
CVE-2026-20643
CVE-2026-28871
CVE-2026-20664
CVE-2026-28857
CVE-2026-28861
CVE-2026-28859
CVE-2026-20691

+ About the security content of iOS 18.7.7 and iPadOS 18.7.7
https://support.apple.com/en-us/126793

+ About the security content of macOS Tahoe 26.4
https://support.apple.com/en-us/126794

+ About the security content of macOS Sequoia 15.7.5
https://support.apple.com/en-us/126795

+ About the security content of macOS Sonoma 14.8.5
https://support.apple.com/en-us/126796

+ About the security content of tvOS 26.4
https://support.apple.com/en-us/126797

+ About the security content of watchOS 26.4
https://support.apple.com/en-us/126798

+ About the security content of visionOS 26.4
https://support.apple.com/en-us/126799

+ About the security content of Safari 26.4
https://support.apple.com/en-us/126800

+ About the security content of Xcode 26.4
https://support.apple.com/en-us/126801

+ watchOS 8.8.2, 5.3.10 released
https://support.apple.com/en-us/100100

+ Mozilla Firefox 149.0 released
https://www.firefox.com/en-US/firefox/149.0/releasenotes/

+ Mozilla Foundation Security Advisory 2026-20 Security Vulnerabilities fixed in Firefox 149
https://www.mozilla.org/en-US/security/advisories/mfsa2026-20/
CVE-2026-4684
CVE-2026-4685
CVE-2026-4686
CVE-2026-4687
CVE-2026-4688
CVE-2026-4689
CVE-2026-4690
CVE-2026-4691
CVE-2026-4692
CVE-2026-4693
CVE-2026-4694
CVE-2026-4695
CVE-2026-4696
CVE-2026-4697
CVE-2026-4698
CVE-2026-4699
CVE-2026-4700
CVE-2026-4701
CVE-2026-4722
CVE-2026-4702
CVE-2026-4723
CVE-2026-4724
CVE-2026-4704
CVE-2026-4705
CVE-2026-4706
CVE-2026-4707
CVE-2026-4708
CVE-2026-4709
CVE-2026-4710
CVE-2026-4711
CVE-2026-4725
CVE-2026-4712
CVE-2026-4713
CVE-2026-4714
CVE-2026-4715
CVE-2026-4716
CVE-2026-4717
CVE-2026-4726
CVE-2025-59375
CVE-2026-4727
CVE-2026-4728
CVE-2026-4718
CVE-2026-4719
CVE-2026-4720
CVE-2026-4729
CVE-2026-4721

+ nginx 1.28.3, 1.29.7 released
https://nginx.org/en/CHANGES-1.28
https://nginx.org/en/CHANGES

+ Mozilla Foundation Security Advisory 2026-23 Security Vulnerabilities fixed in Thunderbird 149
https://www.mozilla.org/en-US/security/advisories/mfsa2026-23/

+ Mozilla Foundation Security Advisory 2026-24 Security Vulnerabilities fixed in Thunderbird 140.9
https://www.mozilla.org/en-US/security/advisories/mfsa2026-24/

+ Mozilla Foundation Security Advisory 2026-22 Security Vulnerabilities fixed in Firefox ESR 140.9
https://www.mozilla.org/en-US/security/advisories/mfsa2026-22/

+ Mozilla Foundation Security Advisory 2026-21 Security Vulnerabilities fixed in Firefox ESR 115.34
https://www.mozilla.org/en-US/security/advisories/mfsa2026-21/

+ Apache Tomcat 10.1.53 Released
https://tomcat.apache.org/tomcat-10.1-doc/changelog.html#Tomcat_10.1.53_(schultz)

VU#330121 IDrive for Windows contains local privilege escalation vulnerability
https://www.kb.cert.org/vuls/id/330121

VU#577436 Hard coded credentials vulnerability in GoHarbor's Harbor
https://www.kb.cert.org/vuls/id/577436

UPDATE: JVNVU#95523788 三菱電機数値制御装置におけるサービス運用妨害(DoS)の脆弱性
https://jvn.jp/vu/JVNVU95523788/index.html

piyokangoの月刊システムトラブル
ソリトンのFileZenに脆弱性 ウイルス検知の有効化で悪用
https://xtech.nikkei.com/atcl/nxt/mag/nnw/18/031800050/031700085/?ST=nxt_thmit_security

2026年3月24日火曜日

24日 火曜日、先勝

+ Google Chrome 146.0.7680.164/165 released
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html

JVNVU#96212424 複数のSchneider Electric製品における複数の脆弱性
https://jvn.jp/vu/JVNVU96212424/index.html

JVNVU#95058959 CTEK製Chargeportalにおける複数の脆弱性
https://jvn.jp/vu/JVNVU95058959/index.html

JVNVU#98951712 IGL-Technologies製eParking.fiにおける複数の脆弱性
https://jvn.jp/vu/JVNVU98951712/index.html

JVNVU#98985254 Automated Logic製WebCTRL Premium Serverにおける複数の脆弱性
https://jvn.jp/vu/JVNVU98985254/index.html

記者の眼
生成AIが「下手な鉄砲」型サイバー攻撃を増やす、足元固めを急ごう
https://xtech.nikkei.com/atcl/nxt/column/18/00138/031901981/?ST=nxt_thmit_security

piyokangoの週刊システムトラブル
小林クリエイト、データ消失原因が判明 第3報で不正アクセスを否定
https://xtech.nikkei.com/atcl/nxt/column/18/00598/010900357/?ST=nxt_thmit_security