<?xml version="1.0" encoding="utf-8"?>
<!-- If you are running a bot please visit this policy page outlining rules you must respect. https://www.livejournal.com/bots/ -->
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:lj="https://www.livejournal.com">
  <id>urn:lj:livejournal.com:atom1:openvz</id>
  <title>OpenVZ</title>
  <subtitle>OpenVZ</subtitle>
  <author>
    <name>OpenVZ</name>
  </author>
  <link rel="alternate" type="text/html" href="https://openvz.livejournal.com/"/>
  <link rel="self" type="text/xml" href="https://openvz.livejournal.com/data/atom"/>
  <updated>2006-11-27T09:34:22Z</updated>
  <lj:journal userid="9392309" username="openvz" type="community"/>
  <link rel="service.feed" type="application/x.atom+xml" href="https://openvz.livejournal.com/data/atom" title="OpenVZ"/>
  <entry>
    <id>urn:lj:livejournal.com:atom1:openvz:9951</id>
    <author>
      <name>Kir Kolyshkin</name>
    </author>
    <lj:poster user="k001" userid="990679"/>
    <link rel="alternate" type="text/html" href="https://openvz.livejournal.com/9951.html"/>
    <link rel="self" type="text/xml" href="https://openvz.livejournal.com/data/atom/?itemid=9951"/>
    <title>Red Hat thanks OpenVZ kernel hacker</title>
    <published>2006-08-28T07:50:46Z</published>
    <updated>2006-11-27T09:34:22Z</updated>
    <content type="html">A bit of shameless PR for our kernel team leader, Kirill Korotaev:&lt;br /&gt;&lt;br /&gt;From &lt;a href="https://rhn.redhat.com/errata/RHSA-2006-0617.html" target="_blank" rel="nofollow"&gt;RHSA-2006-0617&lt;/a&gt;:&lt;br /&gt;&lt;i&gt;&lt;br /&gt;Important: kernel security update&lt;br /&gt;[...]&lt;br /&gt;* a flaw in the restore_all code path of the 4/4GB split support of&lt;br /&gt;non-hugemem kernels that allowed a local user to cause a denial of service&lt;br /&gt;(panic) (CVE-2006-2932, Important)&lt;br /&gt;[...]&lt;br /&gt;Red Hat would like to thank Wei Wang of McAfee Avert Labs and Kirill&lt;br /&gt;Korotaev for reporting issues fixed in this erratum.&lt;/i&gt;</content>
  </entry>
</feed>
