Editing Security
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 2: | Line 2: | ||
== Kernel == | == Kernel == | ||
− | |||
The OpenVZ kernel is based on the Linux kernel. The OpenVZ team tracks and analyzes all the security updates to the Linux kernel and applies them accordingly. | The OpenVZ kernel is based on the Linux kernel. The OpenVZ team tracks and analyzes all the security updates to the Linux kernel and applies them accordingly. | ||
− | To achieve the maximum possible security and stability, | + | To achieve the maximum possible security and stability, OpenVZ kernels are based on Red Hat Enterprise Linux kernels, which are conservative and well-maintained. By using an enterprise kernel as a base (rather than latest vanilla kernel), we avoid adding new bugs or security holes, still the old ones are getting discovered and fixed, and the kernel matures. |
== Audit == | == Audit == | ||
− | + | OpenVZ has undergone a thorough security audit, performed by Solar Designer in winter 2005. He found a single issue in OpenVZ kernel code and a couple of issues in mainstream Linux kernel code — all of them were fixed, and the mainstream fixes were sent to the LKML. | |
− | OpenVZ has undergone a thorough security audit, | ||
[[Category: Security]] | [[Category: Security]] | ||
[[Category: Kernel]] | [[Category: Kernel]] |