"VENOM" Vulnerability betrifft Xen, KVM und QEMU
Von letzter Woche, aber beachtenswert: Ein VM-Ausbruch über die Floppy-Disk-Emulation.
Dazu auch Rapid7: https://community.rapid7.com/Rapid7_BlogPostDetail?id=a111400000AazBCAAZ
http://venom.crowdstrike.com/
Dazu auch Rapid7: https://community.rapid7.com/Rapid7_BlogPostDetail?id=a111400000AazBCAAZ
To recap, if your organization operates the affected virtualization infrastructure for internal, trusted users, you should patch at your earliest convenience, depending on your schedule for other, more critical activities. If, on the other hand, your organization operates the affected virtualization infrastructure for external customers, you should patch immediately in order to protect your customers.
http://venom.crowdstrike.com/
Please also mark the comments that contributed to the solution of the article
Content-Key: 272212
Url: https://administrator.de/contentid/272212
Printed on: July 27, 2024 at 12:07 o'clock