[Users] X86_BUG_CPU_INSECURE

Hristo Benev foxb at abv.bg
Thu Jan 4 05:39:10 MSK 2018


>-------- Оригинално писмо -------- 
>От: Benjamin Henrion zoobab at gmail.com 
>Относно: [Users] X86_BUG_CPU_INSECURE 
>До: "OpenVZ users list. This is THE list you need." <users at openvz.org> 
>Изпратено на: 03.01.2018 03:02 


> Hi, 
> 
> Just reading this: 
> 
> https://amp.reddit.com/r/sysadmin/comments/7nl8r0/intel_bug_incoming/ 
> 
> Xen seems to have a pending patch to be release this week, but people 
> are speculating now that you could bypass the entire isolation process 
> provided by any hypervisor. 
> 
> Wait and see how this will be exploited, but you can be sure there 
> will be exploits soon in the wild. 
> 
> The patch for software mitigation seems to be big and performance impacting. 
> 
> But that would probably mean that containers can be bypassed. 
> 
> Wait and see, 
> 
> -- 
> Benjamin Henrion (zoobab) 
> Email: zoobab at gmail.com 
> Mobile: +32-484-566109 
> Web: http://www.zoobab.com 
> FFII.org Brussels 
> "In July 2005, after several failed attempts to legalise software 
> patents in Europe, the patent establishment changed its strategy. 
> Instead of explicitly seeking to sanction the patentability of 
> software, they are now seeking to create a central European patent 
> court, which would establish and enforce patentability rules in their 
> favor, without any possibility of correction by competing courts or 
> democratically elected legislators." 
> _______________________________________________ 
> Users mailing list 
> Users at openvz.org 
> https://lists.openvz.org/mailman/listinfo/users


https://spectreattack.com

States that OpenVZ might be affected.


More information about the Users mailing list