Security vulnerability - VENOM - CVE-2015-3456 - QEMU/XEN/KVM


VENOM, CVE-2015-3456, is a security vulnerability in the virtual floppy drive code used by many computer virtualization platforms. This vulnerability may allow an attacker to escape from the confines of an affected virtual machine (VM) guest and potentially obtain code-execution access to the host. Absent mitigation, this VM escape could open access to the host system and all other VMs running on that host, potentially giving adversaries significant elevated access to the host’s local network and adjacent systems. For more information, please read the following article (source)

Who is vulnerable:

Xen Project:
Red Hat:



For CentOS/RedHat:

# yum clean all
# yum update


For Debian/Ubuntu:

$ sudo apt-get clean
$ sudo apt-get update
$ sudo apt-get upgrade



The emulated floppy seems to be loaded by default in QEMU and KVM. You can disable the floppy support and start QEMU without floppy emulation while enabling VGA (and/or any other options):

$ qemu -nodefaults -vga std ...

On CentOS/RedHat, you can also manage the virtual machines with libvirt.
See libvirt documention.


External references:;a=commitdiff;h=e907746266721f305d67bc0718795fedee2e824c


Article is closed for comments.
Powered by Zendesk