Skip to content

Instantly share code, notes, and snippets.

@jinpark
Created June 25, 2014 02:29
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save jinpark/3a87e143261d9a8ca3db to your computer and use it in GitHub Desktop.
Save jinpark/3a87e143261d9a8ca3db to your computer and use it in GitHub Desktop.
This message is to all clients on our OpenVZ servers. A critical security vulnerability was published earlier today for OpenVZ. We have upgraded to the latest kernel and reboot all OpenVZ nodes. Due to the significance of the vulnerability and the existince of a public exploit, we did not have time to send out a mass email in advance of taking action. We posted an announcement on our News page in the Client Area and sent out some tweets on @RamNode and @NodeStatus before and during the process. You can read more about this vulnerability here: https://clientarea.ramnode.com/announcements.php?id=364 . As always, we highly recommend that you follow/bookmark http://twitter.com/nodestatus to stay up to date.
While we strive to maintain 100% uptime, this issue was unfortunately outside of our control, being a vulnerability with OpenVZ itself. We typically rely on rebootless updates from KernelCare, but they made it clear that a patch would not be forthcoming immediately. We could not risk everyone's data with a public exploit being available already.
Thank you for your continued business and support.
Regards,
Nick
nick@ramnode.com
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment