This remote code execution vulnerability only affects IE5 and IE6.
Please see the link above for more information.
It is recommended that users of IE5 or IE6 patch to the latest version,
upgrade to IE8 or use an alternative browser to mitigate this risk.
In addition to [NET #1667] VMSA-2010-0002, VMware announced an update to
VMSA-2009-0016.2. This announcement covers 93 CVE vulnerabilities (31
duplicated from VMSA-2010-0002).
The first time I heard about User Private Groups (UPG) is when I was installing one of my first Red Hat Linux systems when I was in college. As a seasoned Solaris administrator, I thought it was very odd that Red Hat didn't put my users into a default group of staff. And then they wanted to change my umask from 022 to 002? What the heck, that doesn't sound secure?
"VMware would like to announce the availability of a public draft for the vSphere 4.0 Security Hardening Guide. This guide represents a new approach to providing security guidance from VMware."
This is an interesting article by Network World which reviews the top patches of 2009. The list was compiled by Qualys' chief technology officer, Wolfgang Kandek and a panel of patch and vulnerability experts to find the five security fixes everyone should deploy from the last 12 months".
For anyone still on Debian 4.0, now is a good time to work on a
migration plan to Debian 5.0. Debian will stop releasing security
updates after February 15th for 4.0.
This is also a good time for Ubuntu users to check their distribution
for similar announcements. Ubuntu is based on Debian.
Here is a new kernel update, unrelated to the last update sent out 9
days ago. It fixes a myriad of new problems including Denial of
Service, Privilege Escalation, kernel panic, file rewrite, and
information leaks to name a few.
It is recommended that RHEL5 systems be updated and rebooted to mitigate
the risk from these issues.