It looks like you're new here. If you want to get involved, click one of these buttons!
Sign In RegisterIt looks like you're new here. If you want to get involved, click one of these buttons!
Howdy, Stranger!
It looks like you've been lurking for a while.
If you register, we also will remember what you have read and notify you about new comments. You will also be able to participate in discussions.
So if you'd like to get involved, register for an account, it'll only take you a minute!
Comments
we are tracking all news related to the issue. The vulnerability is mostly theoretical, so at the moment we are waiting for possible kernel patches. When any updates will be planed of the issue, we will inform in our status page:
https://billing.time4vps.com/status/
Both methods are theoretical, the issue is exposed in general. However the concept of using any of these are very hard and not many could do that in general, due to required knowledge of the things.
However, we ourselves can not do much since now the responsibility of releasing a kernel update is on the manufacturers. So we, like every other person, are kindly waiting for fixes.
I would like to update information that kernel was updated few weeks ago in order to solve the security issues. More information can be found on our status update page:
https://billing.time4vps.com/status/195/linux-kernel-upgrade/