SUSE SLES15 Security Update : containerd, docker and runc (SUSE-SU-2022:2341-1)

The remote SUSE Linux SLES15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2022:2341-1 advisory. - runc is a CLI tool for spawning and runnin ...

Continue Reading
Oracle Linux 8 : olcne (ELSA-2022-9586)

The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2022-9586 advisory. - Istio is an open platform to connect, manage, and ...

Continue Reading
Uncontrolled Resource Consumption in KubeEdge CloudCore Router

### Impact The CloudCore Router does not impose a limit on the size of responses to requests made by the REST handler. An attacker could use this weakness to make a request that will return an HTTP re ...

Continue Reading
olcne security update

olcne [1.4.6-2] - Fix bug in gen-certs-helper script to change permission of node.key to allow opc user to copy over - Update gen-certs-helper script to skip printing olcne_transfer_script execution - ...

Continue Reading
olcne security update

olcne [1.4.6-2] - Fix bug in gen-certs-helper script to change permission of node.key to allow opc user to copy over - Update gen-certs-helper script to skip printing olcne_transfer_script execution - ...

Continue Reading
About CMDB Sync Integration with Qualys CyberSecurity Asset Management

Welcome to the first in a new series of blog posts about Qualys integrations. This first blog in the series covers our integrations as they relate to CMDB Sync, which is a part of [Qualys CyberSecuri ...

Continue Reading
CVE-2022-31078

KubeEdge is an open source system for extending native containerized application orchestration capabilities to hosts at Edge. Prior to versions 1.11.1, 1.10.2, and 1.9.4, the CloudCore Router does not ...

Continue Reading
Uncontrolled Resource Consumption in KubeEdge CloudCore Router

### Impact The CloudCore Router does not impose a limit on the size of responses to requests made by the REST handler. An attacker could use this weakness to make a request that will return an HTTP re ...

Continue Reading

Back to Main

Subscribe for the latest news: