FYI...

---------- Forwarded message ----------
From: Trishan de Lanerolle <tdelanero...@linuxfoundation.org>
Date: Tue, Oct 25, 2016 at 8:02 AM
Subject: [tsc] Fwd: [it-infrastructure-alerts] Emergency security
maintenance affecting all project systems
To: t...@lists.fd.io


FYI: We're applying an update that's impacting multiple LF projects and
should be resolved by end of day (PST) today.

---------- Forwarded message ----------
From: Konstantin Ryabitsev
Date: Tue, Oct 25, 2016 at 9:49 AM
Subject: [it-infrastructure-alerts] Emergency security maintenance
affecting all project systems
To: IT Infrastructure Alerts <it-infrastructure-ale...@linuxfoundation.org>


Hello:

We will be applying kernel updates required to address the local privilege
escalation vulnerability (CVE-2016-5195, aka "Dirty COW"). This update will
require a system reboot, so there will be intermittent availability blips
affecting all LF projects.

This work will be carried out starting today and will hopefully be complete
before the end of the day (U.S. Pacific time). We apologise for any
inconvenience, but this work cannot be delayed or rescheduled for a later
time due to the critical nature of the vulnerability. Thank you for your
understanding.

Best regards,
Konstantin
-- 
Konstantin Ryabitsev
Collaborative Projects IT
The Linux Foundation
+1-971-258-2363



-- 
Trishan R. de Lanerolle
Program Manager
Linux Foundation
voice: +1.203.699.6401
skype: tdelanerolle
email: tdelanero...@linuxfoundation.org

_______________________________________________
tsc mailing list
t...@lists.fd.io
https://lists.fd.io/mailman/listinfo/tsc
_______________________________________________
vpp-dev mailing list
vpp-dev@lists.fd.io
https://lists.fd.io/mailman/listinfo/vpp-dev

Reply via email to