[Users] X86_BUG_CPU_INSECURE
Hristo Benev
foxb at abv.bg
Thu Jan 4 05:39:10 MSK 2018
>-------- Оригинално писмо --------
>От: Benjamin Henrion zoobab at gmail.com
>Относно: [Users] X86_BUG_CPU_INSECURE
>До: "OpenVZ users list. This is THE list you need." <users at openvz.org>
>Изпратено на: 03.01.2018 03:02
> Hi,
>
> Just reading this:
>
> https://amp.reddit.com/r/sysadmin/comments/7nl8r0/intel_bug_incoming/
>
> Xen seems to have a pending patch to be release this week, but people
> are speculating now that you could bypass the entire isolation process
> provided by any hypervisor.
>
> Wait and see how this will be exploited, but you can be sure there
> will be exploits soon in the wild.
>
> The patch for software mitigation seems to be big and performance impacting.
>
> But that would probably mean that containers can be bypassed.
>
> Wait and see,
>
> --
> Benjamin Henrion (zoobab)
> Email: zoobab at gmail.com
> Mobile: +32-484-566109
> Web: http://www.zoobab.com
> FFII.org Brussels
> "In July 2005, after several failed attempts to legalise software
> patents in Europe, the patent establishment changed its strategy.
> Instead of explicitly seeking to sanction the patentability of
> software, they are now seeking to create a central European patent
> court, which would establish and enforce patentability rules in their
> favor, without any possibility of correction by competing courts or
> democratically elected legislators."
> _______________________________________________
> Users mailing list
> Users at openvz.org
> https://lists.openvz.org/mailman/listinfo/users
https://spectreattack.com
States that OpenVZ might be affected.
More information about the Users
mailing list