Red Hat Security Blog: November 2016 archives

  • Evolution of the SSL and TLS protocols

    The Transport Layer Security (TLS) protocol is undoubtedly the most widely used protocol on the Internet today. If you have ever done an online banking transaction, visited a social networking website, or checked your email, you have most likely used TLS. Apart from wrapping the plain text HTTP protocol with cryptographic goodness, other lower level protocols like SMTP and FTP can also use TLS to ensure that all the data between client and server is inaccessible to attackers in between. This...
    Posted 2016-11-16T14:30:00+00:00 - 0
  • Understanding and mitigating the Dirty Cow Vulnerability

    Rodrigo Freire & David Sirrine - Red Hat Technical Account Management Team Dirty Cow (CVE-2016-5195) is the latest branded vulnerability, with a name, a logo, and a website, to impact Red Hat Enterprise Linux. This flaw is a widespread vulnerability and spans Red Hat Enterprise Linux versions 5, 6, and 7. Technical details about the vulnerability and how to address it can be found at: Kernel Local Privilege Escalation "Dirty COW" - CVE-2016-5195. In order to be successful, an attacker must...
    Posted 2016-11-09T14:30:00+00:00 - 2
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.