how does SELinux/SVirt protect against the VENOM vuln?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



In the news:

http://www.zdnet.com/article/venom-security-flaw-millions-of-virtual-machines-datacenters/

http://venom.crowdstrike.com/

I'm wondering how SELinux/SVirt can protect against this?  

https://libvirt.org/drvqemu.html#securitysvirt

My guess is that if an attacker subverts a qemu-kvm guest, they cannot
use that to access other VMs.  But can they still crash the other
guests or the host itself?

Thanks.
--
selinux mailing list
selinux@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/selinux





[Index of Archives]     [Fedora Users]     [Fedora Desktop]     [Big List of Linux Books]     [Yosemite News]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux