Keith C. Perry on 15 May 2015 08:53:15 -0700

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] Venom

LOL, I was just thinking that too Thomas.  This isn't even up on the US-CERT list (though is obviously up on the main CVE site).  The patch is in the QEMU's dev repository (git) but I'm going to wait next QEMU release and just recompile on my VM hosts.  This attack vector would require a number of other security compromises so I wouldn't score it that high.

~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ 
Keith C. Perry, MS E.E. 
Owner, DAO Technologies LLC 
(O) +1.215.525.4165 x2033 
(M) +1.215.432.5167

----- Original Message -----
From: "Thomas Delrue" <>
To: "Philadelphia Linux User's Group Discussion List" <>
Sent: Friday, May 15, 2015 11:49:36 AM
Subject: Re: [PLUG] Venom

On 05/15/2015 11:07 AM, Anthony Martin wrote:
> Was wondering what people thought about this and had any suggestions that
> didn't involve having to reboot the hundreds of vms we have.

I stopped caring about 'branded bugs' a while ago... *especially* if
they have a logo

While I don't agree with everything in the following article, the author
does make a couple of good points:
And I do agree with the conclusion: "How much more of this FUD is going
to circulate before journalists realise (sic) that they make a mountain
out of a molehill?"

If you really want to know which bugs to keep an eye on, I recommend and other sites like it instead of 'journalists'.
[cynicism off]
Philadelphia Linux Users Group         --
Announcements -
General Discussion  --
Philadelphia Linux Users Group         --
Announcements -
General Discussion  --