[Openstack-operators] Venom vulnerability

Tim Bell Tim.Bell at cern.ch
Wed May 13 14:31:26 UTC 2015

Looking through the details of the Venom vulnerability, https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/, it would appear that the QEMU processes need to be restarted.

Our understanding is thus that a soft reboot of the VM is not sufficient but a hard one would be OK.

Some quick tests have shown that a suspend/resume of the VM also causes a new process.

How are others looking to address this vulnerability ?

(I guess the security session will have a few extra people signing up in Vancouver now...)


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openstack.org/pipermail/openstack-operators/attachments/20150513/6c950269/attachment.html>

More information about the OpenStack-operators mailing list