Is DO aware of the VENOM vulnerability?

A friend linked me to an article earlier detailing a new vulnerability that was released that could allow attackers access to VM’s that are next to each other on any given host. The details are here:

From that site: "The bug is in QEMU’s virtual Floppy Disk Controller (FDC). This vulnerable FDC code is used in numerous virtualization platforms and appliances, notably Xen, KVM, and the native QEMU client.

VMware, Microsoft Hyper-V, and Bochs hypervisors are not impacted by this vulnerability."

Any information available from a DO rep about this?

Show comments

Submit an answer

This textbox defaults to using Markdown to format your answer.

You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!

Sign In or Sign Up to Answer

These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

Want to learn more? Join the DigitalOcean Community!

Join our DigitalOcean community of over a million developers for free! Get help and share knowledge in Q&A, subscribe to topics of interest, and get courses and tools that will help you grow as a developer and scale your project or business.

After performing a thorough audit of our infrastructure, we have published a blog update detailing the steps we taken concerning the vulnerability. As discussed there, a small number of our hypervisors will require a reboot. The team is currently working to schedule this in the least disruptive manner. If you have any additional questions, please reach out to the support team:

This was just posted by DO regarding this vulnerability.