FYI... ---------- Forwarded message ---------- From: Trishan de Lanerolle <tdelanero...@linuxfoundation.org> Date: Tue, Oct 25, 2016 at 8:02 AM Subject: [tsc] Fwd: [it-infrastructure-alerts] Emergency security maintenance affecting all project systems To: t...@lists.fd.io
FYI: We're applying an update that's impacting multiple LF projects and should be resolved by end of day (PST) today. ---------- Forwarded message ---------- From: Konstantin Ryabitsev Date: Tue, Oct 25, 2016 at 9:49 AM Subject: [it-infrastructure-alerts] Emergency security maintenance affecting all project systems To: IT Infrastructure Alerts <it-infrastructure-ale...@linuxfoundation.org> Hello: We will be applying kernel updates required to address the local privilege escalation vulnerability (CVE-2016-5195, aka "Dirty COW"). This update will require a system reboot, so there will be intermittent availability blips affecting all LF projects. This work will be carried out starting today and will hopefully be complete before the end of the day (U.S. Pacific time). We apologise for any inconvenience, but this work cannot be delayed or rescheduled for a later time due to the critical nature of the vulnerability. Thank you for your understanding. Best regards, Konstantin -- Konstantin Ryabitsev Collaborative Projects IT The Linux Foundation +1-971-258-2363 -- Trishan R. de Lanerolle Program Manager Linux Foundation voice: +1.203.699.6401 skype: tdelanerolle email: tdelanero...@linuxfoundation.org _______________________________________________ tsc mailing list t...@lists.fd.io https://lists.fd.io/mailman/listinfo/tsc
_______________________________________________ vpp-dev mailing list vpp-dev@lists.fd.io https://lists.fd.io/mailman/listinfo/vpp-dev