Report this

What is the reason for this report?

Is DO aware of the VENOM vulnerability?

Posted on May 13, 2015

A friend linked me to an article earlier detailing a new vulnerability that was released that could allow attackers access to VM’s that are next to each other on any given host. The details are here: http://venom.crowdstrike.com/

From that site: "The bug is in QEMU’s virtual Floppy Disk Controller (FDC). This vulnerable FDC code is used in numerous virtualization platforms and appliances, notably Xen, KVM, and the native QEMU client.

VMware, Microsoft Hyper-V, and Bochs hypervisors are not impacted by this vulnerability."

Any information available from a DO rep about this?



This textbox defaults to using Markdown to format your answer.

You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

After performing a thorough audit of our infrastructure, we have published a blog update detailing the steps we taken concerning the vulnerability. As discussed there, a small number of our hypervisors will require a reboot. The team is currently working to schedule this in the least disruptive manner. If you have any additional questions, please reach out to the support team:

https://cloud.digitalocean.com/support

This was just posted by DO regarding this vulnerability.

https://www.digitalocean.com/company/blog/update-on-CVE-2015-3456/

The developer cloud

Scale up as you grow — whether you're running one virtual machine or ten thousand.

Get started for free

Sign up and get $200 in credit for your first 60 days with DigitalOcean.*

*This promotional offer applies to new accounts only.