We have released fixed RHEL6-based kernel, please update your nodes to 2.6.32-042stab127.2 kernel
Thank you, Vasily Averin On 2018-01-04 06:03, Alex Kobets wrote: > Hi, > > > Virtuozzo will release the kernel with fix asap. > > We have it under testing right now > > > Thank you, > > Alex > > ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ > *From:* users-boun...@openvz.org <users-boun...@openvz.org> on behalf of > Hristo Benev <f...@abv.bg> > *Sent:* Wednesday, January 3, 2018 6:39:10 PM > *To:* zoo...@gmail.com; OpenVZ users > *Subject:* Re: [Users] X86_BUG_CPU_INSECURE > >>-------- Оригинално писмо -------- >>От: Benjamin Henrion zoo...@gmail.com >>Относно: [Users] X86_BUG_CPU_INSECURE >>До: "OpenVZ users list. This is THE list you need." <users@openvz.org> >>Изпратено на: 03.01.2018 03:02 > > >> Hi, >> >> Just reading this: >> >> https://amp.reddit.com/r/sysadmin/comments/7nl8r0/intel_bug_incoming/ >> >> Xen seems to have a pending patch to be release this week, but people >> are speculating now that you could bypass the entire isolation process >> provided by any hypervisor. >> >> Wait and see how this will be exploited, but you can be sure there >> will be exploits soon in the wild. >> >> The patch for software mitigation seems to be big and performance impacting. >> >> But that would probably mean that containers can be bypassed. >> >> Wait and see, >> >> -- >> Benjamin Henrion (zoobab) >> Email: zoobab at gmail.com >> Mobile: +32-484-566109 >> Web: http://www.zoobab.com >> FFII.org Brussels >> "In July 2005, after several failed attempts to legalise software >> patents in Europe, the patent establishment changed its strategy. >> Instead of explicitly seeking to sanction the patentability of >> software, they are now seeking to create a central European patent >> court, which would establish and enforce patentability rules in their >> favor, without any possibility of correction by competing courts or >> democratically elected legislators." >> _______________________________________________ >> Users mailing list >> Users@openvz.org >> https://lists.openvz.org/mailman/listinfo/users > > > https://spectreattack.com > > States that OpenVZ might be affected. > _______________________________________________ > Users mailing list > Users@openvz.org > https://lists.openvz.org/mailman/listinfo/users > > > _______________________________________________ > Users mailing list > Users@openvz.org > https://lists.openvz.org/mailman/listinfo/users > _______________________________________________ Users mailing list Users@openvz.org https://lists.openvz.org/mailman/listinfo/users