Tux Machines

Security Leftovers

Posted by Roy Schestowitz on Sep 12, 2022

=> Fedora Family / Red Hat/ IBM Leftovers | today's howtos

Announcing the Auto-refreshing Official Kubernetes CVE Feed | Kubernetes

=> ↺ Announcing the Auto-refreshing Official Kubernetes CVE Feed | Kubernetes

A long-standing request from the Kubernetes community has been to have a programmatic way for end users to keep track of Kubernetes security issues (also called "CVEs", after the database that tracks public security issues across different products and vendors). Accompanying the release of Kubernetes v1.25, we are excited to announce availability of such a feed as an alpha feature. This blog will cover the background and scope of this new service.

Security updates for Monday [LWN.net]

=> ↺ Security updates for Monday [LWN.net]

Security updates have been issued by Debian (gdk-pixbuf, libxslt, linux-5.10, paramiko, and zlib), Fedora (webkit2gtk3), Mageia (gstreamer1.0-plugins-good, jupyter-notebook, kernel, and rpm), Slackware (vim), SUSE (bluez, clamav, freetype2, frr, gdk-pixbuf, keepalived, libyang, nodejs16, python-PyYAML, qpdf, samba, and vim), and Ubuntu (linux-azure-fde and tiff).

Security advisory: zlib in Qt

=> ↺ Security advisory: zlib in Qt

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field and has been assigned the CVE id CVE-2022-37434.

10 Best Email Security Practices to Avoid Data Breach

=> ↺ 10 Best Email Security Practices to Avoid Data Breach

Never assume that your email security is adequate. Since the invention of the telephone, communication between individuals has advanced significantly. Letters, payphones, cordless calls, and electronic mail are just a few examples.
If you are finding yourself wondering what email breach security is, you have come to the right place.
Email is used by most firms, and they even rank among the most crucial channels for business communication. Its adaptability in conveying information from future events, clients, team memos, and a few more renders it a unique corporate weapon.

=> gemini.tuxmachines.org

Proxy Information
Original URL
gemini://gemini.tuxmachines.org/n/2022/09/12/Security_Leftovers.gmi
Status Code
Success (20)
Meta
text/gemini;lang=en-GB
Capsule Response Time
140.141812 milliseconds
Gemini-to-HTML Time
6.091293 milliseconds

This content has been proxied by September (3851b).