>-------- Оригинално писмо -------- >От: Benjamin Henrion zoo...@gmail.com >Относно: [Users] X86_BUG_CPU_INSECURE >До: "OpenVZ users list. This is THE list you need." <users@openvz.org> >Изпратено на: 03.01.2018 03:02
> Hi, > > Just reading this: > > https://amp.reddit.com/r/sysadmin/comments/7nl8r0/intel_bug_incoming/ > > Xen seems to have a pending patch to be release this week, but people > are speculating now that you could bypass the entire isolation process > provided by any hypervisor. > > Wait and see how this will be exploited, but you can be sure there > will be exploits soon in the wild. > > The patch for software mitigation seems to be big and performance impacting. > > But that would probably mean that containers can be bypassed. > > Wait and see, > > -- > Benjamin Henrion (zoobab) > Email: zoobab at gmail.com > Mobile: +32-484-566109 > Web: http://www.zoobab.com > FFII.org Brussels > "In July 2005, after several failed attempts to legalise software > patents in Europe, the patent establishment changed its strategy. > Instead of explicitly seeking to sanction the patentability of > software, they are now seeking to create a central European patent > court, which would establish and enforce patentability rules in their > favor, without any possibility of correction by competing courts or > democratically elected legislators." > _______________________________________________ > Users mailing list > Users@openvz.org > https://lists.openvz.org/mailman/listinfo/users https://spectreattack.com States that OpenVZ might be affected. _______________________________________________ Users mailing list Users@openvz.org https://lists.openvz.org/mailman/listinfo/users