FEDORA-2022-f9ace23a78
Packages in this update:
keylime-6.4.0-1.fc34
Update description:
Updating for Keylime release v6.4.0
Fixes CVE-2022-1053
keylime-6.4.0-1.fc34
Updating for Keylime release v6.4.0
Fixes CVE-2022-1053
keylime-6.4.0-1.fc35
Updating for Keylime release v6.4.0
Fixes CVE-2022-1053
keylime-6.4.0-1.fc36
Updating for Keylime release v6.4.0
Fixes CVE-2022-1053
Agility and flexibility were key directives in the development of new technology, which is why on-premise assets soon transitioned into virtual machines, which further transformed into compact and swift containers. Modern enterprise network environments are increasingly transforming to be cloud-based, where both applications and data storage are hosted in a cloud — and often multi-cloud — environment. The attack surfaces and security protection requirements of software in distributed cloud environments are vastly different from traditional network architectures where applications and data were hosted on enterprise-owned servers in on-premises data centers.
Whether a company utilizes a private, hybrid or public cloud infrastructure or offers cloud services to others, it is critical that each cloud instance and service be isolated to help minimize the risk of data compromise. In a traditional network, networking equipment and firewalls segment and isolate physical servers and other devices. However, to effectively isolate cloud instances, technologies like micro-segmentation are needed.
Micro-segmentation can help minimize damage caused by a compromised cloud asset. It can reduce the severity to a contained incident that can be remediated quickly versus an expansive data breach that spans multiple parts of the business, or numerous clients in a multi-tenant service. While proper implementation of micro-segmentation is vital, at a high-level view it can be summarized as a 5-step process.
Software-defined wide area networking, or SD-WAN, is the next frontier for the network edge. Multiple analysts report that the SD-WAN market is in the billions of dollars, with an annual growth rate in the 25% to 35% range. Managed service providers and carriers globally are increasingly deploying managed SD-WAN services to reach new markets. Almost all networking and security vendors have SD-WAN offerings, complicating the decision when choosing an SD-WAN solution.
Security and WAN connectivity decisions have become a collaborative decision between the security and networking teams. Prior to this, enterprise networking teams were responsible for setting up connectivity to major company locations, while connections to branches and remote offices fell to the enterprise WAN manager. In the meantime, dedicated security teams were tasked with procuring, deploying, and managing firewalls.
Digital transformation, or DX, is driving enterprises worldwide to adapt their network and security strategies. Two key trends in particular have accelerated due to the pandemic: the adoption of cloud infrastructures, and the growth of a distributed workforce. Together, these trends have forced a restructuring of both networking and security. Now, enterprises need to deploy security services anytime, anywhere, across a diverse set of architectures and endpoints. Further, they need to control and secure the distributed workforce, internal resources and cloud infrastructures.
First cybersecurity book written exclusively by women and non-binary experts published
USN-5395-1 fixed vulnerabilities in networkd-dispatcher. Unfortunately
that update was incomplete and could introduce a regression. This update
fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that networkd-dispatcher incorrectly handled internal
scripts. A local attacker could possibly use this issue to cause a race
condition, escalate privileges and execute arbitrary code.
(CVE-2022-29799, CVE-2022-29800)
Graham Cluley Security News is sponsored this week by the folks at Keeper Security. Thanks to the great team there for their support! The mass migration to distributed work presented IT and DevOps teams with new challenges as they were forced to perform infrastructure monitoring and management remotely. IT and DevOps personnel needed a secure, … Continue reading “Keeper Connection Manager : Privileged access to remote infrastructure with zero-trust and zero-knowledge security”