Red Hat Security Blog: April 2013 archives

  • Anatomy of a Red Hat Security Advisory

    Red Hat Security Advisories (RHSA) document the security flaws being fixed in Red Hat products. They include: The affected products the advisory applies to. The security rating of the update (low, moderate, important, critical). A brief description of the flaws being fixed. How an attacker could exploit the issues, such as whether they need privileges or not. Any manual action that may be required, such as restarting applications that use an affected library, or configuration file changes. In...
    Posted 2013-04-24T13:00:14+00:00 - 0
  • Detecting security flaws with FindBugs

    Security response is largely a reactive process for handling problems that are already in software being used in production environments. The coordinated disclosure of vulnerability information attempts to protect software consumers from exposure to threats that are not yet public. However, it is much more desirable and cost effective to reduce the number of security issues that are introduced to the software during the development process. And while security training and awareness programs...
    Posted 2013-04-10T13:00:11+00:00 - 0
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.