Is DO aware of the VENOM vulnerability?

May 13, 2015 13k views
VPN Security DigitalOcean

A friend linked me to an article earlier detailing a new vulnerability that was released that could allow attackers access to VM's that are next to each other on any given host. The details are here:

From that site:
"The bug is in QEMU’s virtual Floppy Disk Controller (FDC). This vulnerable FDC code is used in numerous virtualization platforms and appliances, notably Xen, KVM, and the native QEMU client.

VMware, Microsoft Hyper-V, and Bochs hypervisors are not impacted by this vulnerability."

Any information available from a DO rep about this?

3 Answers

After performing a thorough audit of our infrastructure, we have published a blog update detailing the steps we taken concerning the vulnerability. As discussed there, a small number of our hypervisors will require a reboot. The team is currently working to schedule this in the least disruptive manner. If you have any additional questions, please reach out to the support team:

  • Hey,

    Thanks for the update and great to know that you have already taken or taking action to prevent any security issue..

    Just one doubt, how do I know if my droplet falls under those small number of system requiring reboot ??


  • Hey @hunky. If any of your droplets are on a hypervisor requiring a reboot, you will receive an email notification with the scheduled time and date so that you can plan in advance if needed.

  • Thanks again for the information..

Experts' Opinions Mixed On VENOM Vulnerability
Some say the virtualization vuln could be worse than Heartbleed, while others advise to patch, but don't panic.

Have another answer? Share your knowledge.