-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Tim Smith <[email protected]>
- Loading branch information
Showing
5 changed files
with
215 additions
and
120 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,4 @@ | ||
--- | ||
name: "CLA Assistant" | ||
on: | ||
issue_comment: | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,68 @@ | ||
--- | ||
slug: mondoo-10.10-is-out/ | ||
title: Mondoo 10.10 is out! | ||
author: Tim Smith | ||
author_title: Mondoo Core Team | ||
author_url: https://github.com/tas50 | ||
tags: [release, mondoo] | ||
--- | ||
|
||
## 🥳 Mondoo 10.10 is out! This release includes xz vulnerability detection, expanded AWS asset inventory, and more! | ||
|
||
Get this release: [Installation Docs](https://mondoo.com/docs/cnspec/) | [Package Downloads](https://releases.mondoo.com/cnspec/) | [Docker Container](https://hub.docker.com/r/mondoo/cnspec) | ||
|
||
--- | ||
|
||
## 🎉 NEW FEATURES | ||
|
||
### xz vulnerability policy | ||
|
||
The recent xz supply chain attack in xz 5.6.0 and 5.6.1 (CVE-2024–3094) thankfully didn't make it in any mainstream enterprise Linux distributions. There's still a significant risk if employees are running rolling distributions or pre-releases of upcoming Linux distros. To quickly evaluate your CVE-2024–3094 expose we've created a new xz Vulnerability (CVE-2024–3094) policy that looks for xz 5.6.0/5.6.1 on impacted Linux releases: | ||
|
||
- Alpine | ||
- Arch | ||
- Debian trixie/sid | ||
- Fedora 40 | ||
- Kali 2024.1 | ||
- openSUSE Tumbleweed | ||
|
||
![xz Policy affected assets](/img/releases/2024-04-02-mondoo-10.10-is-out/xz_policy.png) | ||
|
||
## 🧹 IMPROVEMENTS | ||
|
||
### Resource improvements | ||
|
||
#### aws.autoscaling.groups | ||
|
||
- Improve default values | ||
- New `availabilityZones` field | ||
- New `capacityRebalance` field | ||
- New `defaultInstanceWarmup` field | ||
- New `desiredCapacity` field | ||
- New `instances` field | ||
- New `maxInstanceLifetime` field | ||
|
||
#### aws.cloudfront.distributions | ||
|
||
- New `cnames` field | ||
|
||
### Improved AWS asset overview information | ||
|
||
DEETS | ||
|
||
### Expanded Endpoint Detection and Response policy support | ||
|
||
Detect the ESET EDR in the Endpoint Detection and Response (EDR) policy. | ||
|
||
### New Terraform checks in CIS GCP Foundation policy | ||
|
||
Flag critical security misconfigurations before they're ever running in your infrastructure with expanded Terraform config checks in the CIS Google Cloud Platform Foundation policy. New checks evaluate Terraform configs for proper [GCP uniform bucket level access](https://cloud.google.com/storage/docs/uniform-bucket-level-access) setup. | ||
|
||
## 🐛 BUG FIXES AND UPDATES | ||
|
||
- Improve performance of AWS cloud detection. | ||
- Fix Windows policies with multi-language support to rely on the system language not the locale. | ||
- Simplify the Linux server installation instructions. | ||
- Support vulnerability scanning of RPMs with a `^` symbol in the name. | ||
- Update additional CIS GCP Foundations checks to work against Terraform configs. | ||
- Fix `CIS VMware ESXi 6.7 Benchmark - Corporate/Enterprise Environment` policy to only apply to VMware 6. |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Oops, something went wrong.