Each year, Red Hat Product Security reflects back and reviews the vulnerabilities that impacted our products. We’ve shared the results of this analysis in our annual Red Hat Product Security Risk report.
Looking back, 2018 was a busy year in the field of incident response and vulnerability management. Many high-profile issues were discovered that had broad-reaching impacts to operations in all sectors, from traditional data-centers all the way out to the edges of the cloud. Customers potentially affected by issues with kernels, Kubernetes and others looked to Red Hat to help understand the potential to impact their operations.
Our annual risk report provides context for these security-related flaws, informs you how/if our products were affected by major vulnerabilities over the past year, and elaborates on our methodology for identifying potential impact on our customers. Our philosophy of providing clear advice and analysis along with our security errata has continued as we have faced an increased number of new exploits and vulnerabilities across the open source spectrum. It is about managing risks versus letting risks manage you.
This year we reviewed:
- Security response metrics.
- Specific vulnerabilities.
- The most common ways Red Hat users were affected by security vulnerabilities.
Among our findings from 2018:
- Across the Red Hat portfolio, we issued 111 Critical advisories addressing 57 Critical vulnerabilities. (An overall increase over the last several years of reporting.)
- 80% of Critical issues were addressed within one week.
- 2894 issues were reported to Product Security; of those only 430 (14.8%) were embargoed for some period of time.
- A catchy name or a flashy headline for a vulnerability doesn't tell much about its risk. Red Hat Product Security helps customers determine the actual vulnerability impact. Like previous years, the majority of issues that mattered were not branded.
Learn more about the flaws that made an impact in 2018 by reading the full report.
Sull'autore
Christopher Robinson, better known as CRob to his colleagues, is a former Product Security Program Architect at Red Hat.
Altri risultati simili a questo
Ricerca per canale
Automazione
Novità sull'automazione IT di tecnologie, team e ambienti
Intelligenza artificiale
Aggiornamenti sulle piattaforme che consentono alle aziende di eseguire carichi di lavoro IA ovunque
Hybrid cloud open source
Scopri come affrontare il futuro in modo più agile grazie al cloud ibrido
Sicurezza
Le ultime novità sulle nostre soluzioni per ridurre i rischi nelle tecnologie e negli ambienti
Edge computing
Aggiornamenti sulle piattaforme che semplificano l'operatività edge
Infrastruttura
Le ultime novità sulla piattaforma Linux aziendale leader a livello mondiale
Applicazioni
Approfondimenti sulle nostre soluzioni alle sfide applicative più difficili
Serie originali
Raccontiamo le interessanti storie di leader e creatori di tecnologie pensate per le aziende
Prodotti
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Servizi cloud
- Scopri tutti i prodotti
Strumenti
- Formazione e certificazioni
- Il mio account
- Supporto clienti
- Risorse per sviluppatori
- Trova un partner
- Red Hat Ecosystem Catalog
- Calcola il valore delle soluzioni Red Hat
- Documentazione
Prova, acquista, vendi
Comunica
- Contatta l'ufficio vendite
- Contatta l'assistenza clienti
- Contatta un esperto della formazione
- Social media
Informazioni su Red Hat
Red Hat è leader mondiale nella fornitura di soluzioni open source per le aziende, tra cui Linux, Kubernetes, container e soluzioni cloud. Le nostre soluzioni open source, rese sicure per un uso aziendale, consentono di operare su più piattaforme e ambienti, dal datacenter centrale all'edge della rete.
Seleziona la tua lingua
Red Hat legal and privacy links
- Informazioni su Red Hat
- Opportunità di lavoro
- Eventi
- Sedi
- Contattaci
- Blog di Red Hat
- Diversità, equità e inclusione
- Cool Stuff Store
- Red Hat Summit