Liblve, kmod-lve, and kernel have been rolled out to 100%
New updated liblve, kmod-lve, and kernel packages have been rolled out to 100% and are now available for download from our production repository.
Changelog
kernel-1.5-64
- CLKRN-863: CVE-2020-36385: RDMA/ucma: Rework ucma_migrate_id() to avoid races with destroy
- CLKRN-863: CVE-2020-36385: RDMA/ucma: Fix locking for ctx->events_reported
- CLKRN-863: CVE-2020-36385: RDMA/ucma: Fix the locking of ctx->file
- CLKRN-863: CVE-2020-36385: RDMA/cma: Add missing locking to rdma_accept()
- KMODLVE-478: add missing LVE_API_* directives into setuid feature
- CLKRN-859: added CAP_SYS_ADMIN capability allowing ptrace children
- KMODLVE-470: don't restrict root process from traversing symlinks
- KMODLVE-461: register usage cleanup
- KMODLVE-460: unused label removal
liblve-2.1-5
- KMODLVE-476 jail: kill homecoded password parser
kmod-lve-2.0-41
- KMODLVE-463: tc does not work properly with class major 0x0
- KMODLVE-478: add missing LVE_API_* directives into setuid feature
- CLKRN-859: added CAP_SYS_ADMIN capability allowing ptrace children
- MODLVE-452: build: use a minimal possible kernel version
Update
To update the kernel for CloudLinux OS 7, run the following command:
yum install kernel-3.10.0-962.3.2.lve1.5.64.el7
To update the kernel for CloudLinux OS 6 hybrid, run the following command:
yum install kernel-3.10.0-962.3.2.lve1.5.64.el6h
To update lve-kmod, run the following command:
yum update kernel kmod-lve
To update liblve, run the following command:
yum update lve liblve