Looking through the details of the Venom vulnerability, https://securityblog.redhat.com/2015/05/13/venom-dont-get-bitten/, it would appear that the QEMU processes need to be restarted. Our understanding is thus that a soft reboot of the VM is not sufficient but a hard one would be OK. Some quick tests have shown that a suspend/resume of the VM also causes a new process. How are others looking to address this vulnerability ? (I guess the security session will have a few extra people signing up in Vancouver now...) Tim -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.openstack.org/pipermail/openstack-operators/attachments/20150513/6c950269/attachment.html>