Is DO aware of the VENOM vulnerability?

May 13, 2015 16.8k views
VPN Security DigitalOcean

A friend linked me to an article earlier detailing a new vulnerability that was released that could allow attackers access to VM's that are next to each other on any given host. The details are here:

From that site:
"The bug is in QEMU’s virtual Floppy Disk Controller (FDC). This vulnerable FDC code is used in numerous virtualization platforms and appliances, notably Xen, KVM, and the native QEMU client.

VMware, Microsoft Hyper-V, and Bochs hypervisors are not impacted by this vulnerability."

Any information available from a DO rep about this?

  • I'd also like an answer to this question! DO, please issue a statement of some kind.

  • Wondering this also.

  • All who wants an answer, please do hit the LOVE button there in below the user name of the topic creator..

    I am too looking for a statement of DO..

  • Adding myself to the list of people who would like to hear DO say something about this :)

  • Also concerned about the Venom bug and how it affects DO servers.

2 Answers

After performing a thorough audit of our infrastructure, we have published a blog update detailing the steps we taken concerning the vulnerability. As discussed there, a small number of our hypervisors will require a reboot. The team is currently working to schedule this in the least disruptive manner. If you have any additional questions, please reach out to the support team:

  • Hey,

    Thanks for the update and great to know that you have already taken or taking action to prevent any security issue..

    Just one doubt, how do I know if my droplet falls under those small number of system requiring reboot ??


  • Hey @hunky. If any of your droplets are on a hypervisor requiring a reboot, you will receive an email notification with the scheduled time and date so that you can plan in advance if needed.

  • Thanks again for the information..

Have another answer? Share your knowledge.