Is DO aware of the VENOM vulnerability?

Posted May 13, 2015 17.7k views

A friend linked me to an article earlier detailing a new vulnerability that was released that could allow attackers access to VM’s that are next to each other on any given host. The details are here:

From that site:
“The bug is in QEMU’s virtual Floppy Disk Controller (FDC). This vulnerable FDC code is used in numerous virtualization platforms and appliances, notably Xen, KVM, and the native QEMU client.

VMware, Microsoft Hyper-V, and Bochs hypervisors are not impacted by this vulnerability.”

Any information available from a DO rep about this?


These answers are provided by our Community. If you find them useful, show some love by clicking the heart. If you run into issues leave a comment, or add your own answer to help others.

Submit an Answer
2 answers

After performing a thorough audit of our infrastructure, we have published a blog update detailing the steps we taken concerning the vulnerability. As discussed there, a small number of our hypervisors will require a reboot. The team is currently working to schedule this in the least disruptive manner. If you have any additional questions, please reach out to the support team:

  • Hey,

    Thanks for the update and great to know that you have already taken or taking action to prevent any security issue..

    Just one doubt, how do I know if my droplet falls under those small number of system requiring reboot ??


  • Hey @hunky. If any of your droplets are on a hypervisor requiring a reboot, you will receive an email notification with the scheduled time and date so that you can plan in advance if needed.

  • Thanks again for the information..