Venom Hypervisor Vulnerability

Number: AV15-047
Date: 14 May 2015


The purpose of this advisory is to bring attention to a critical vulnerability affecting multiple computer virtualization platforms.


The QEMU's (Quick Emulator) virtual Floppy Disk controller (FDC) code is vulnerable to an attacker escaping from the virtual machine guest system and potentially obtaining code-execution access to the host. Since the FDC module is part of the hypervisor, the vulnerability is indifferent to the host operating system. An attacker would need administrative or root privileges in the guest operating system to exploit this vulnerability.

CVE Reference: CVE-2015-3456

Suggested action

CCIRC recommends that owner/operators who utilize virtual environments based on QEMU, such as Xen, KVM and others, verify their vendor's website, and test and deploy the appropriate update or workaround to affected platforms.


Note to Readers

In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.

Please note, CCIRC PGP key has recently been updated.

For general information, please contact Public Safety Canada's Public Affairs division at:

Telephone: 613-944-4875 or 1-800-830-3118
Fax: 613-998-9589

Date modified: