Amazon Aurora MySQL unterstützt schnelleren Export zu S3

AWS hat heute bis zu 10-mal schnellere Exporte zu Amazon S3 für Snapshot-Exporte für Amazon Aurora MySQL-kompatible Edition für MySQL 5.7 und 8.0 angekündigt. Die Leistungsverbesserung wird automatisch auf alle Arten von Datenbank-Snapshot-Exporten angewendet, einschließlich manueller Snapshots, automatisierter System-Snapshots und Snapshots, die vom AWS Backup Service erstellt wurden.
Quelle: aws.amazon.com

AWS Control Tower jetzt in GovCloud-Regionen (USA) verfügbar

AWS GovCloud (USA) ermöglicht es den Behörden der US-Regierung und ihren Vertragsnehmern, vertraulichere Arbeitslasten in die Cloud zu verschieben. Dabei werden ihre besonderen Anforderungen hinsichtlich Vorschriften und Compliance berücksichtigt. Durch die Ausweitung von AWS Control Tower auf die AWS GovCloud (USA)-Regionen bietet AWS Control Tower Kunden in der GovCloud (USA)-Region und ihren Partnern jetzt die Möglichkeit, ihre sicheren Cloud-Lösungen zu gestalten.
Quelle: aws.amazon.com

Security Advisory: Critical OpenSSL Vulnerability

What is it?

The OpenSSL Project will release a security fix (OpenSSL version 3.0.7) for a new-and-disclosed CVE on Tuesday, November 1, 2022. This CVE is categorized as “CRITICAL” and affects all OpenSSL versions after 3.0.

Docker estimates about 1,000 image repositories could be impacted across various Docker Official Images and Docker Verified Publisher images. This includes images that are based on versions of Debian 12, Ubuntu 22.04, and Redhat Enterprise Linux 9+ which install 3.x versions of OpenSSL.

We’re updating our users now so you can prepare to remediate any impacted images. We’ll also update this advisory as the OpenSSL Project releases more details next week.

Am I vulnerable?

While we’re waiting on the Project to release specific vulnerability details, you can still see if your public and private repositories are impacted. Docker created a placeholder for the OpenSSL CVE, which we’ll soon replace with the official CVE once it’s disclosed. 

Like with Heartbleed, OpenSSL’s maintainers are being careful about what information they publicize until a fix arrives. However, you can act before this announcement. We’ve created a way to quickly and transparently analyze any image’s security flaws.

Visit Docker’s Image Vulnerability Database, navigate to the “Vulnerability search” tab, and search for the placeholder security advisory dubbed “DSA-2022-0001.” You can also use this tool to see other vulnerabilities as they’re discovered, receive updates to refresh outdated base images, and more:

Once we learn more about this vulnerability, you can take targeted steps to determine how vulnerable you are. We suggest using the docker scan CLI command and Snyk’s Docker Hub Vulnerability Scanning tool. This will help detect the presence of vulnerable library versions and flag your image as vulnerable.

Alternatively, Docker is providing an experimental local tool to detect OpenSSL 3.x in Docker images. You can install this tool from its GitHub repository. Then, you can search your image for OpenSSL 3.x version with the following command:

$ docker-index cve –image gradle@sha256:1a6b42a0a86c9b62ee584f209a17d55a2c0c1eea14664829b2630f28d57f430d DSA-2022–0001

If the image contains a potentially vulnerable OpenSSL version, your terminal output will resemble the following:

WARNING Detected DSA-2022-0001 at
WARNING
WARNING pkg:deb/ubuntu/openssl@3.0.2-0ubuntu1.6?os_distro=jammy&os_name=ubuntu&os_version=22.04
WARNING
WARNING Instruction: /bin/sh -c #(nop) ADD file:ba96f963bbfd429a0839c40603fdd7829eaca58f20adfa0d15e6beae8244bc08 in /
WARNING Layer 0: sha256:301a8b74f71f85f3a31e9c7e7fedd5b001ead5bcf895bc2911c1d260e06bd987

And if Docker doesn’t detect a vulnerable version of OpenSSL in your image, you’ll see the following:

INFO DSA-2022-0001 not detected

Check back soon for more

As mentioned earlier, we’ll update this blog once the OpenSSL Project provides more vulnerability details. We also encourage you to sign up for our Early Access Program to access the tools discussed in this blog — plus share invaluable product feedback to help us improve!
Quelle: https://blog.docker.com/feed/