Search results

  1. T

    OOM killer during ZFS scrub

    many thanks. 50% is a lot. we have other proxmox nodes with 80% memory consumtion, without problems.
  2. T

    OOM killer during ZFS scrub

    we have the same issue on 3 proxmox nodes. all 3 nodes have high RAM consumtion (95% or more). suddenly on each of 3 nodes the VM with most memory was killed due OOM whenever it happens it is time 00:25 Is there a ZFS scrub or so? this happens nearly every month and only on high RAM usage...
  3. T

    CVE-2023-40360 qemu-kvm security

    Thanks. No we only use Proxmox GUI to set VMs.
  4. T

    CVE-2023-40360 qemu-kvm security

    Is the CVE-2023-40360 a problem to Proxmox? Proxmox using KVM for virtual machines. Many thanks.
  5. T

    AMD Incpetion fixes cause QEMU/KVM memory leak

    we are unclear about inception. we use zen2 AMD cpu. are we safe? https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html is unclear and "These architectures do not require a microcode update since the IBPB feature introduced in 2018 to mitigate Spectre v2 already works fine...
  6. T

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    today new microcode was published for buster. now we are on 0xfa and happy
  7. T

    [SOLVED] PVE 7.3 with CVE-2022-35508

    Thanks, yes we are on 3.2-5 all 3 fixes?
  8. T

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    Yes, but we can not do experiments because it is a productive environment. so we have to wait for https://security-tracker.debian.org/tracker/CVE-2022-40982 3.20230214.1~deb10u1 update.
  9. T

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    welcome , no worry 0xfa i have never seen and we wonder, because we are on 0xf4 with fresh updates and reboot. 0xf4 seems not to be an old version. and if, how can we upgrade to 0xfa ? we have /lib/firmware/intel-ucode , all file in there are from april. intel-microcode is already the newest...
  10. T

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    yes 8 ;), but this did not solve our problems because yet we can not update. so we do microcode updates and reboots. but we wonder, see abough. 06_9EH D Coffee Lake H Coffee Lake Xeon E Coffee Lake S 9th Generation Intel® Core™ Processor Family Intel® Xeon® E processor family 9th...
  11. T

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    we have no new kernel with debian 10 and proxmox 6 (yes we know, upgrade to 7, but impossible yet). so we get cat /sys/devices/system/cpu/vulnerabilities/gather_data_sampling cat: /sys/devices/system/cpu/vulnerabilities/gather_data_sampling: No such file or directory cat /proc/version Linux...
  12. T

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    we do: but the list from intel is not clear, is can be the last microcode, but there is no info about mitigation of this issue or about this microcode is the only last available for this cpu. we wonder bebause on intel we get for our cpu: "2023.3: 0xf4" but in dmesg: [ 0.000000] microcode...
  13. T

    [URGENT] Intel downfall / AMD Inception kernel security updates & microcode

    we installed microcode and reboot. we have [ 0.000000] microcode: microcode updated early to revision 0xf4, date = 2022-07-31 [ 1.665605] microcode: sig=0x906ed, pf=0x2, revision=0xf4 [ 1.668257] microcode: Microcode Update Driver: v2.2. intel says...
  14. T

    [SOLVED] PVE 7.3 with CVE-2022-35508

    CVE-2022-31358 and CVE-2022-35508 and CVE-2022-35507 are fixed in 6.4-15 , right?
  15. T

    Zenbleed - CVE-2023-20593

    What says cat /pro/cpuinfo as your microcode? https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041863
  16. T

    Zenbleed - CVE-2023-20593

    Thanks. Sure, but we have Kernelcare. This helps get some upgrades. we will upgrade the "dist" asap.
  17. T

    Zenbleed - CVE-2023-20593

    ok thanks. do we have any problems with 5.13 Kernel? all VMs running fine. we have microcode updated : microcode updated early to new patch_level=0x0830107a so we can still be on kernel 5.13 or? we do not like to reboot our proxmox again now. many customers ;)
  18. T

    Zenbleed - CVE-2023-20593

    we have apt update apt upgrade and now: Linux 5.13.19-6-pve #1 SMP PVE 5.13.19-15 (Tue, 29 Mar 2022 15:59:50 +0200) PVE-Manager-Version pve-manager/7.4-16/0f39f621 seems old kernel 2022. Is there no newer?
  19. T

    Zenbleed - CVE-2023-20593

    ok, to be claear, so with Proxmox "default" it is not enough to do "apt upgrade" and reboot the proxmox host. we first have to install the amd64-microcode package?

About

The Proxmox community has been around for many years and offers help and support for Proxmox VE, Proxmox Backup Server, and Proxmox Mail Gateway.
We think our community is one of the best thanks to people like you!

Get your subscription!

The Proxmox team works very hard to make sure you are running the best software and getting stable updates and security enhancements, as well as quick enterprise support. Tens of thousands of happy customers have a Proxmox subscription. Get yours easily in our online shop.

Buy now!