c.r.s.
Goto Top

"VENOM" Vulnerability betrifft Xen, KVM und QEMU

Von letzter Woche, aber beachtenswert: Ein VM-Ausbruch über die Floppy-Disk-Emulation.

Dazu auch Rapid7: https://community.rapid7.com/Rapid7_BlogPostDetail?id=a111400000AazBCAAZ

To recap, if your organization operates the affected virtualization infrastructure for internal, trusted users, you should patch at your earliest convenience, depending on your schedule for other, more critical activities. If, on the other hand, your organization operates the affected virtualization infrastructure for external customers, you should patch immediately in order to protect your customers.

http://venom.crowdstrike.com/

Content-Key: 272212

Url: https://administrator.de/contentid/272212

Printed on: July 27, 2024 at 12:07 o'clock