Thank you.
El 06/01/18 a les 12:40, Vasily Averin ha escrit: > We have released fixed RHEL6-based kernel, > please update your nodes to 2.6.32-042stab127.2 kernel > > Thank you, > Vasily Averin > > On 2018-01-04 06:03, Alex Kobets wrote: >> Hi, >> >> >> Virtuozzo will release the kernel with fix asap. >> >> We have it under testing right now >> >> >> Thank you, >> >> Alex >> >> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ >> *From:* users-boun...@openvz.org <users-boun...@openvz.org> on behalf of >> Hristo Benev <f...@abv.bg> >> *Sent:* Wednesday, January 3, 2018 6:39:10 PM >> *To:* zoo...@gmail.com; OpenVZ users >> *Subject:* Re: [Users] X86_BUG_CPU_INSECURE >> >>> -------- Оригинално писмо -------- >>> От: Benjamin Henrion zoo...@gmail.com >>> Относно: [Users] X86_BUG_CPU_INSECURE >>> До: "OpenVZ users list. This is THE list you need." <users@openvz.org> >>> Изпратено на: 03.01.2018 03:02 >> >> >>> Hi, >>> >>> Just reading this: >>> >>> https://amp.reddit.com/r/sysadmin/comments/7nl8r0/intel_bug_incoming/ >>> >>> Xen seems to have a pending patch to be release this week, but people >>> are speculating now that you could bypass the entire isolation process >>> provided by any hypervisor. >>> >>> Wait and see how this will be exploited, but you can be sure there >>> will be exploits soon in the wild. >>> >>> The patch for software mitigation seems to be big and performance >>> impacting. >>> >>> But that would probably mean that containers can be bypassed. >>> >>> Wait and see, >>> >>> -- >>> Benjamin Henrion (zoobab) >>> Email: zoobab at gmail.com >>> Mobile: +32-484-566109 >>> Web: http://www.zoobab.com >>> FFII.org Brussels >>> "In July 2005, after several failed attempts to legalise software >>> patents in Europe, the patent establishment changed its strategy. >>> Instead of explicitly seeking to sanction the patentability of >>> software, they are now seeking to create a central European patent >>> court, which would establish and enforce patentability rules in their >>> favor, without any possibility of correction by competing courts or >>> democratically elected legislators." >>> _______________________________________________ >>> Users mailing list >>> Users@openvz.org >>> https://lists.openvz.org/mailman/listinfo/users >> >> >> https://spectreattack.com >> >> States that OpenVZ might be affected. >> _______________________________________________ >> Users mailing list >> Users@openvz.org >> https://lists.openvz.org/mailman/listinfo/users >> >> >> _______________________________________________ >> Users mailing list >> Users@openvz.org >> https://lists.openvz.org/mailman/listinfo/users >> > > _______________________________________________ > Users mailing list > Users@openvz.org > https://lists.openvz.org/mailman/listinfo/users > _______________________________________________ Users mailing list Users@openvz.org https://lists.openvz.org/mailman/listinfo/users