VENOM Bug In QEMU Escapes VM Security
Written by Michael Larabel in Linux Security on 13 May 2015 at 09:22 AM EDT. 10 Comments
LINUX SECURITY --
The latest high-profile security vulnerability affecting open-source software and impacting mass amounts of systems worldwide is dubbed VENOM.

The VENOM vulnerability was made public today by security firm CrowdStrike. VENOM is formally known as CVE-2015-3456 and is an issue with QEMU's virtual floppy disk drive code that's used by many virtualization platforms. VENOM allows for attackers to escape a virtual machine and potentially access the host and thereby gaining access to other virtual machines on the same system.


This bug is within QEMU's floppy disk controller and that code is also used by Xen, KVM, and the native QEMU client. Meanwhile, Bochs, VMware, and Microsoft Hyper-V aren't affected. This bug is vulnerable to any platform running QEMU whether it be Linux, Windows, Solaris, OS X, etc.

This major security vulnerability has been present since 2004 when the virtual floppy disk support was first added to QEMU. Those wishing to learn more details can visit the new venom.crowdstrike.com informational page.
About The Author
Author picture

Michael Larabel is the principal author of Phoronix.com and founded the site in 2004 with a focus on enriching the Linux hardware experience. Michael has written more than 10,000 articles covering the state of Linux hardware support, Linux performance, graphics drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated benchmarking software. He can be followed via Twitter or contacted via MichaelLarabel.com.

Related Linux Security News
Popular News This Week