[Users] X86_BUG_CPU_INSECURE

Narcis Garcia informatica at actiu.net
Sat Jan 6 14:49:08 MSK 2018


Thank you.


El 06/01/18 a les 12:40, Vasily Averin ha escrit:
> We have released fixed RHEL6-based kernel,
> please update your nodes to 2.6.32-042stab127.2 kernel
> 
> Thank you,
> 	Vasily Averin
> 
> On 2018-01-04 06:03, Alex Kobets wrote:
>> Hi,
>>
>>
>> Virtuozzo will release the kernel with fix asap. 
>>
>> We have it under testing right now
>>
>>
>> Thank you,
>>
>> Alex
>>
>> ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
>> *From:* users-bounces at openvz.org <users-bounces at openvz.org> on behalf of Hristo Benev <foxb at abv.bg>
>> *Sent:* Wednesday, January 3, 2018 6:39:10 PM
>> *To:* zoobab at gmail.com; OpenVZ users
>> *Subject:* Re: [Users] X86_BUG_CPU_INSECURE
>>  
>>> -------- Оригинално писмо -------- 
>>> От: Benjamin Henrion zoobab at gmail.com 
>>> Относно: [Users] X86_BUG_CPU_INSECURE 
>>> До: "OpenVZ users list. This is THE list you need." <users at openvz.org> 
>>> Изпратено на: 03.01.2018 03:02 
>>
>>
>>> Hi, 
>>>
>>> Just reading this: 
>>>
>>> https://amp.reddit.com/r/sysadmin/comments/7nl8r0/intel_bug_incoming/
>>>
>>> Xen seems to have a pending patch to be release this week, but people 
>>> are speculating now that you could bypass the entire isolation process 
>>> provided by any hypervisor. 
>>>
>>> Wait and see how this will be exploited, but you can be sure there 
>>> will be exploits soon in the wild. 
>>>
>>> The patch for software mitigation seems to be big and performance impacting. 
>>>
>>> But that would probably mean that containers can be bypassed. 
>>>
>>> Wait and see, 
>>>
>>> -- 
>>> Benjamin Henrion (zoobab) 
>>> Email: zoobab at gmail.com 
>>> Mobile: +32-484-566109 
>>> Web: http://www.zoobab.com
>>> FFII.org Brussels 
>>> "In July 2005, after several failed attempts to legalise software 
>>> patents in Europe, the patent establishment changed its strategy. 
>>> Instead of explicitly seeking to sanction the patentability of 
>>> software, they are now seeking to create a central European patent 
>>> court, which would establish and enforce patentability rules in their 
>>> favor, without any possibility of correction by competing courts or 
>>> democratically elected legislators." 
>>> _______________________________________________ 
>>> Users mailing list 
>>> Users at openvz.org 
>>> https://lists.openvz.org/mailman/listinfo/users
>>
>>
>> https://spectreattack.com
>>
>> States that OpenVZ might be affected.
>> _______________________________________________
>> Users mailing list
>> Users at openvz.org
>> https://lists.openvz.org/mailman/listinfo/users
>>
>>
>> _______________________________________________
>> Users mailing list
>> Users at openvz.org
>> https://lists.openvz.org/mailman/listinfo/users
>>
> 
> _______________________________________________
> Users mailing list
> Users at openvz.org
> https://lists.openvz.org/mailman/listinfo/users
> 



More information about the Users mailing list