Thanks a lot! 2018-01-06 14:40 GMT+03:00 Vasily Averin <v...@virtuozzo.com>:
> We have released fixed RHEL6-based kernel, > please update your nodes to 2.6.32-042stab127.2 kernel > > Thank you, > Vasily Averin > > On 2018-01-04 06:03, Alex Kobets wrote: > > Hi, > > > > > > Virtuozzo will release the kernel with fix asap. > > > > We have it under testing right now > > > > > > Thank you, > > > > Alex > > > > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------------------------------------ > ------------------------------ > > *From:* users-boun...@openvz.org <users-boun...@openvz.org> on behalf > of Hristo Benev <f...@abv.bg> > > *Sent:* Wednesday, January 3, 2018 6:39:10 PM > > *To:* zoo...@gmail.com; OpenVZ users > > *Subject:* Re: [Users] X86_BUG_CPU_INSECURE > > > >>-------- Оригинално писмо -------- > >>От: Benjamin Henrion zoo...@gmail.com > >>Относно: [Users] X86_BUG_CPU_INSECURE > >>До: "OpenVZ users list. This is THE list you need." <users@openvz.org> > >>Изпратено на: 03.01.2018 03:02 > > > > > >> Hi, > >> > >> Just reading this: > >> > >> https://amp.reddit.com/r/sysadmin/comments/7nl8r0/intel_bug_incoming/ > >> > >> Xen seems to have a pending patch to be release this week, but people > >> are speculating now that you could bypass the entire isolation process > >> provided by any hypervisor. > >> > >> Wait and see how this will be exploited, but you can be sure there > >> will be exploits soon in the wild. > >> > >> The patch for software mitigation seems to be big and performance > impacting. > >> > >> But that would probably mean that containers can be bypassed. > >> > >> Wait and see, > >> > >> -- > >> Benjamin Henrion (zoobab) > >> Email: zoobab at gmail.com > >> Mobile: +32-484-566109 > >> Web: http://www.zoobab.com > >> FFII.org Brussels > >> "In July 2005, after several failed attempts to legalise software > >> patents in Europe, the patent establishment changed its strategy. > >> Instead of explicitly seeking to sanction the patentability of > >> software, they are now seeking to create a central European patent > >> court, which would establish and enforce patentability rules in their > >> favor, without any possibility of correction by competing courts or > >> democratically elected legislators." > >> _______________________________________________ > >> Users mailing list > >> Users@openvz.org > >> https://lists.openvz.org/mailman/listinfo/users > > > > > > https://spectreattack.com > > > > States that OpenVZ might be affected. > > _______________________________________________ > > Users mailing list > > Users@openvz.org > > https://lists.openvz.org/mailman/listinfo/users > > > > > > _______________________________________________ > > Users mailing list > > Users@openvz.org > > https://lists.openvz.org/mailman/listinfo/users > > > > _______________________________________________ > Users mailing list > Users@openvz.org > https://lists.openvz.org/mailman/listinfo/users > -- Best Regards, Sergey Mamonov
_______________________________________________ Users mailing list Users@openvz.org https://lists.openvz.org/mailman/listinfo/users