>
> > Just applied the fix to the first affected AMD machine and all is well
> > again.
> >
> > Would this be worth putting a ticket into Vultr to get them to make
> > appropriate updates on their side?
>
> Yes (but I see you already did)
>

Here's the reply I got from Vultr about this:



Thank you for contacting us. We are aware of OpenBSD instances
dropping to ddb upon boot after the initial zenbleed patches went out.
This was fixed as of the 015 patch that was released today:
https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/015_hvamdcpu.patch.sig

If you have an OpenBSD instance that is still stuck at ddb and
therefore cannot apply the 015 patch, please let us know, as there is
a manual workaround we can do to get it to boot. After that, you can
run syspatch again which should install that newest patch, and you
should have no issues.

Regarding the Zenbleed vulnerability itself, none of our AMD hosts are
known to be vulnerable at this time as they are all running Milan and
later CPUs. The CPU config provided to guests will say Rome, but that
is provided for compatibility purposes and is not related to the
actual host node CPU.

We are continuing to monitor this vulnerability, and will be taking
appropriate steps to mitigate it once the full impact has been
determined.

Reply via email to