[Users] X86_BUG_CPU_INSECURE
Vasily Averin
vvs at virtuozzo.com
Sat Jan 6 14:40:41 MSK 2018
We have released fixed RHEL6-based kernel,
please update your nodes to 2.6.32-042stab127.2 kernel
Thank you,
Vasily Averin
On 2018-01-04 06:03, Alex Kobets wrote:
> Hi,
>
>
> Virtuozzo will release the kernel with fix asap.
>
> We have it under testing right now
>
>
> Thank you,
>
> Alex
>
> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> *From:* users-bounces at openvz.org <users-bounces at openvz.org> on behalf of Hristo Benev <foxb at abv.bg>
> *Sent:* Wednesday, January 3, 2018 6:39:10 PM
> *To:* zoobab at gmail.com; OpenVZ users
> *Subject:* Re: [Users] X86_BUG_CPU_INSECURE
>
>>-------- Оригинално писмо --------
>>От: Benjamin Henrion zoobab at gmail.com
>>Относно: [Users] X86_BUG_CPU_INSECURE
>>До: "OpenVZ users list. This is THE list you need." <users at openvz.org>
>>Изпратено на: 03.01.2018 03:02
>
>
>> Hi,
>>
>> Just reading this:
>>
>> https://amp.reddit.com/r/sysadmin/comments/7nl8r0/intel_bug_incoming/
>>
>> Xen seems to have a pending patch to be release this week, but people
>> are speculating now that you could bypass the entire isolation process
>> provided by any hypervisor.
>>
>> Wait and see how this will be exploited, but you can be sure there
>> will be exploits soon in the wild.
>>
>> The patch for software mitigation seems to be big and performance impacting.
>>
>> But that would probably mean that containers can be bypassed.
>>
>> Wait and see,
>>
>> --
>> Benjamin Henrion (zoobab)
>> Email: zoobab at gmail.com
>> Mobile: +32-484-566109
>> Web: http://www.zoobab.com
>> FFII.org Brussels
>> "In July 2005, after several failed attempts to legalise software
>> patents in Europe, the patent establishment changed its strategy.
>> Instead of explicitly seeking to sanction the patentability of
>> software, they are now seeking to create a central European patent
>> court, which would establish and enforce patentability rules in their
>> favor, without any possibility of correction by competing courts or
>> democratically elected legislators."
>> _______________________________________________
>> Users mailing list
>> Users at openvz.org
>> https://lists.openvz.org/mailman/listinfo/users
>
>
> https://spectreattack.com
>
> States that OpenVZ might be affected.
> _______________________________________________
> Users mailing list
> Users at openvz.org
> https://lists.openvz.org/mailman/listinfo/users
>
>
> _______________________________________________
> Users mailing list
> Users at openvz.org
> https://lists.openvz.org/mailman/listinfo/users
>
More information about the Users
mailing list