There is currently significant media attention surrounding a new vulnerability in the Linux kernel called copy.fail. We understand that such reports may raise questions regarding the security of your KeyHub environment.
We always assess the actual impact on the KeyHub architecture. In this specific case, there is no cause for immediate concern, provided you follow your regular update process.
The impact on your KeyHub environment is minimal. The copy.fail bug is what is known as a local user exploit. This means that a malicious actor would already need active access as a local user on the operating system to exploit the vulnerability. In a standard KeyHub implementation, it is unusual (and unnecessary) for users to log in directly to the Virtual Machine (VM). Consequently, the practical attack surface is virtually non-existent.
Despite the low risk, we always advise keeping your systems up to date. The fix for this vulnerability has been incorporated into KeyHub 48, which will be available from Monday 11 May. Depending on your version, the following applies:
Do you have specific questions regarding your configuration? Please contact us via our support channel.