Editing News/updates

Jump to: navigation, search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision Your text
Line 552: Line 552:
 
== Kernel RHEL6 testing 042stab115.2 ==
 
== Kernel RHEL6 testing 042stab115.2 ==
  
Rebase to RHEL6u8 beta kernel 2.6.32-621.el6.
+
Since {{kernel link|rhel6-testing|042stab115.2}}:
 +
 
 +
* Rebase to RHEL6u8 beta kernel 2.6.32-621.el6
  
 
{{Download link|kernel/rhel6-testing/042stab115.2}}
 
{{Download link|kernel/rhel6-testing/042stab115.2}}
Line 560: Line 562:
 
== Kernel RHEL6 testing 042stab114.5 ==
 
== Kernel RHEL6 testing 042stab114.5 ==
  
Proper fix for CVE-2016-3156. Fix for kernel BUG in cfq-iosched (OVZ-6651). Fix for kernel crash inside pick_next_task_fair() (PSBM-44475). Write to CIFS share hangs (OVZ-6642). ub memcg: fake use_hierarhy file is required for KVM's libvirtd (OVZ-6660). Other fixes.
+
Since {{kernel link|rhel6-testing|042stab113.21}}:
 +
 
 +
* CVE-2016-3156: ipv4: Don't do expensive useless work during inetdev destroy. PSBM-42403)
 +
  issue was workarounded in 042stab113.11 kernel by adding per-container limit on using of ipv4 addresses
 +
  here old workaround is replaced by fix backported from mainline linux kernel.
 +
* fix for kernel BUG at block/cfq-iosched.c:2806  (OVZ-6651)
 +
* fix for kernel crash inside pick_next_task_fair() (PSBM-44475)
 +
* write to CIFS share hangs (OVZ-6642)
 +
* ub memcg: fake use_hierarhy file is required for KVM's libvirtd (OVZ-6660)
 +
* some internal fixes
  
 
{{Download link|kernel/rhel6-testing/042stab114.5}}
 
{{Download link|kernel/rhel6-testing/042stab114.5}}
Line 570: Line 581:
 
This Virtuozzo 7.0 Beta offers the following major improvements:
 
This Virtuozzo 7.0 Beta offers the following major improvements:
  
Unified management of containers and KVM virtual machines with the prlctl tool and SDK. You get a single universal toolset for all CT/VM management needs.
+
* Unified management of containers and KVM virtual machines with the prlctl tool and SDK. You get a single universal toolset for all CT/VM management needs.
  
Autoballooning and kernel same-page merging that allows overcommitting memory resources in the smartest way possible with an insignificant impact on customer workloads.
+
* Autoballooning and kernel same-page merging that allows overcommitting memory resources in the smartest way possible with an insignificant impact on customer workloads.
  
Memory hotplugging for containers and VMs that allows both increasing and reducing CT/VM memory size on the fly, without the need to reboot. Your customers can now scale their workloads without any downtime. This feature also enables you to make PAYG offerings, allowing customers to change VM resources depending on workload and potentially pay less.
+
* Memory hotplugging for containers and VMs that allows both increasing and reducing CT/VM memory size on the fly, without the need to reboot. Your customers can now scale their workloads without any downtime. This feature also enables you to make PAYG offerings, allowing customers to change VM resources depending on workload and potentially pay less.
  
Memory guarantees for both containers and virtual machines.
+
* Memory guarantees for both containers and virtual machines.
  
Ability to manage containers and VMs with libvirt and virt-manager. If you used to manage VMs with libvirt, you can do it in Virtuozzo in absolutely the same way.
+
* Ability to manage containers and VMs with libvirt and virt-manager. If you used to manage VMs with libvirt, you can do it in Virtuozzo in absolutely the same way.
  
Guest tools for Windows and Linux VMs.
+
* Guest tools for Windows and Linux VMs.
  
 
[https://download.openvz.org/virtuozzo/releases/7.0-beta3/x86_64/iso/ Download]
 
[https://download.openvz.org/virtuozzo/releases/7.0-beta3/x86_64/iso/ Download]
Line 588: Line 599:
 
== Kernel RHEL6 042stab113.21 ==
 
== Kernel RHEL6 042stab113.21 ==
  
IPv6 link-local address was being assigned to slave interfaces in bonding which resulted in DAD and network routing issues. (PSBM-42433). kswap activity needed to be restricted in case of high-order requests (PSBM-44291). Force charge swapin readahead pages if in ub0. (PSBM-44857). Missing bounds check in ipt_entry structure in netfilter. (PSBM-45193, CVE-2016-3134). IPv6 connect could cause DoS via NULL pointer dereference (PSBM-45219, CVE-2015-8543). Pipe buffer state corruption after unsuccessful atomic read from pipe (PSBM-45328, CVE-2016-0774). hostapd was broken in early RHEL6.7 kernels (OVZ-6649).
+
* IPv6 link-local address was being assigned to slave interfaces in bonding which resulted in DAD and network routing issues. (PSBM-42433)
 +
* kswap activity needed to be restricted in case of high-order requests (PSBM-44291)
 +
* Force charge swapin readahead pages if in ub0. (PSBM-44857)
 +
* Missing bounds check in ipt_entry structure in netfilter. (PSBM-45193, CVE-2016-3134)
 +
* IPv6 connect could cause DoS via NULL pointer dereference (PSBM-45219, CVE-2015-8543)
 +
* Pipe buffer state corruption after unsuccessful atomic read from pipe (PSBM-45328, CVE-2016-0774)
 +
* hostapd was broken in early RHEL6.7 kernels. (OVZ-6649)
  
 
{{Download link|kernel/rhel6/042stab113.21}}
 
{{Download link|kernel/rhel6/042stab113.21}}
Line 596: Line 613:
 
== Kernel RHEL6 testing 042stab113.21 ==
 
== Kernel RHEL6 testing 042stab113.21 ==
  
Missing bounds check in ipt_entry structure in netfilter. (PSBM-45193, CVE-2016-3134). IPv6 connect could cause DoS via NULL pointer dereference (PSBM-45219, CVE-2015-8543). Pipe buffer state corruption after unsuccessful atomic read from pipe (PSBM-45328, CVE-2016-0774). hostapd was broken in early RHEL6.7 kernels. (OVZ-6649)
+
* Missing bounds check in ipt_entry structure in netfilter. (PSBM-45193, CVE-2016-3134)
 +
* IPv6 connect could cause DoS via NULL pointer dereference (PSBM-45219, CVE-2015-8543)
 +
* Pipe buffer state corruption after unsuccessful atomic read from pipe (PSBM-45328, CVE-2016-0774)
 +
* hostapd was broken in early RHEL6.7 kernels. (OVZ-6649)
  
 
{{Download link|kernel/rhel6-testing/042stab113.21}}
 
{{Download link|kernel/rhel6-testing/042stab113.21}}
Line 604: Line 624:
 
== Kernel RHEL6 testing 042stab113.18 ==
 
== Kernel RHEL6 testing 042stab113.18 ==
  
bonding: Prevent IPv6 link local address on enslaved devices (PSBM-42433). kswap activity restriction in case high-order requests (PSBM-44291). force charge swapin readahead pages if in ub0 (PSBM-44857)
+
* bonding: Prevent IPv6 link local address on enslaved devices (PSBM-42433)
 +
* kswap activity restriction in case high-order requests (PSBM-44291)
 +
* force charge swapin readahead pages if in ub0 (PSBM-44857)
  
 
{{Download link|kernel/rhel6-testing/042stab113.18}}
 
{{Download link|kernel/rhel6-testing/042stab113.18}}
Line 612: Line 634:
 
== Kernel RHEL6 stable 042stab113.17 ==
 
== Kernel RHEL6 stable 042stab113.17 ==
  
Crash in restore_one_vfsmount() on restoring shared non-master mounts (PSBM-42471). Introduced FADV_DEACTIVATE flag in fadvise() to be able to move file pages from the active to the inactive list (PSBM-42664). Race between keyctl_read() and keyctl_revoke() could crash the host (PSBM-43799, CVE-2015-7550). Under certain circumstances, backup/restore via CBT interface could hang the host (PSBM-43936). Second-level quota in simfs containers was broken in 042stab113.x kernels (OVZ-6655).
+
* Crash in restore_one_vfsmount() on restoring shared non-master mounts. (PSBM-42471)
 +
* Introduced FADV_DEACTIVATE flag in fadvise() to be able to move file pages from the active to the inactive list. (PSBM-42664)
 +
* Race between keyctl_read() and keyctl_revoke() could crash the host. (PSBM-43799, CVE-2015-7550)
 +
* Under certain circumstances, backup/restore via CBT interface could hang the host. (PSBM-43936)
 +
* Second-level quota in simfs containers was broken in 042stab113.x kernels. (OVZ-6655)
  
 
{{Download link|kernel/rhel6/042stab113.17}}
 
{{Download link|kernel/rhel6/042stab113.17}}
Line 620: Line 646:
 
== Kernel RHEL6 testing 042stab113.17 ==
 
== Kernel RHEL6 testing 042stab113.17 ==
  
Crash in restore_one_vfsmount() on restoring shared non-master mounts (PSBM-42471). Introduced FADV_DEACTIVATE flag in fadvise() to be able to move file pages from the active to the inactive list (PSBM-42664). Race between keyctl_read() and keyctl_revoke() could crash the host (PSBM-43799, CVE-2015-7550). Under certain circumstances, backup/restore via CBT interface could hang the host (PSBM-43936). Second-level quota in simfs containers was broken in 042stab113.x kernels (OVZ-6655).
+
* Crash in restore_one_vfsmount() on restoring shared non-master mounts. (PSBM-42471)
 +
* Introduced FADV_DEACTIVATE flag in fadvise() to be able to move file pages from the active to the inactive list. (PSBM-42664)
 +
* Race between keyctl_read() and keyctl_revoke() could crash the host. (PSBM-43799, CVE-2015-7550)
 +
* Under certain circumstances, backup/restore via CBT interface could hang the host. (PSBM-43936)
 +
* Second-level quota in simfs containers was broken in 042stab113.x kernels. (OVZ-6655)
  
 
{{Download link|kernel/rhel6-testing/042stab113.17}}
 
{{Download link|kernel/rhel6-testing/042stab113.17}}
Line 628: Line 658:
 
== Kernel RHEL5 stable 028stab120.1 ==
 
== Kernel RHEL5 stable 028stab120.1 ==
  
Rebase to RHEL5 kernel 2.6.32-408.el5. Fixes for CVE-2015-5364, CVE-2015-5366.
+
* Rebase to RHEL5 kernel 2.6.32-408.el5
 +
* A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)
  
 
{{Download link|kernel/rhel5/028stab120.1}}
 
{{Download link|kernel/rhel5/028stab120.1}}
Line 636: Line 667:
 
== Kernel RHEL5 testing 028stab120.1 ==
 
== Kernel RHEL5 testing 028stab120.1 ==
  
Rebase to RHEL5 kernel 2.6.32-408.el5. Fixes for CVE-2015-5364, CVE-2015-5366.
+
* Rebase to RHEL5 kernel 2.6.32-408.el5
 +
* A flaw was found in the way the Linux kernel's networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use this flaw to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality (CVE-2015-5364, CVE-2015-5366)
  
 
{{Download link|kernel/rhel5-testing/028stab120.1}}
 
{{Download link|kernel/rhel5-testing/028stab120.1}}
Line 644: Line 676:
 
== Kernel RHEL5 stable 028stab119.6 ==
 
== Kernel RHEL5 stable 028stab119.6 ==
  
Improved accounting for network-related memory objects (PCLIN-32553). Introduced a per-container limit for the number of mounts (PCLIN-32554). Introduced a per-container limit for IPv4 network interface aliases (PCLIN-32555).
+
* Improved accounting for network-related memory objects (PCLIN-32553)
 +
* Introduced a per-container limit for the number of mounts (PCLIN-32554)
 +
* Introduced a per-container limit for IPv4 network interface aliases (PCLIN-32555)
  
 
{{Download link|kernel/rhel5/028stab119.6}}
 
{{Download link|kernel/rhel5/028stab119.6}}

Please note that all contributions to OpenVZ Virtuozzo Containers Wiki may be edited, altered, or removed by other contributors. If you don't want your writing to be edited mercilessly, then don't submit it here.
If you are going to add external links to an article, read the External links policy first!

To edit this page, please answer the question that appears below (more info):

Cancel Editing help (opens in new window)

Template used on this page: