New in version 3.1

January 6th, 2015
  • Recent changes in Owl 3.1-stable include update to RHEL 5.11-based Linux/OpenVZ kernel along with Red Hat's fix for a local privilege escalation vulnerability on x86-64 (CVE-2014-9322). So please upgrade.

New in version 20120818 (August 20th, 2012)

  • The Linux kernel has been rebased on the latest from OpenVZ's RHEL5-based "testing" branch.
  • binutils, tcsh, xinetd, and OpenSSL have been updated to new upstream versions, and assorted minor changes have been made to many Owl packages.
  • The system has been rebuilt with the new binutils, which required some tweaks in various packages (now included, so further rebuilds work seamlessly), and new ISOs and OpenVZ templates have been generated for i686 and x86_64.
  • Overall, this mostly conservative update is a precursor to a similar update to Owl 3.0-stable, and to more aggressive changes in Owl-current.

New in version 3.0 (March 14th, 2011)

  • Since the 3.0 release, a Vim packaging error has been corrected, a vulnerability in the patch(1) program (CVE-2010-4651) and two vulnerabilities in OpenSSL (CVE-2010-4180, CVE-2009-0590) have been fixed, vsftpd has been updated to 2.3.4 (which fixes CVE-2011-0762), and patchutils was updated to 0.3.2.

New in version 20100323 (March 23rd, 2010)

  • Updated the kernel to OpenVZ's latest from their "rhel5" branch (2.6.18-164.11.1.el5.028stab068.5 released on 2010/03/18) with Red Hat's patches up to 2.6.18-164.15.1.el5 added (apparently prepared by Red Hat on 2010/03/01, released and announced on 2010/03/16), and with some minor changes of our own. We call the resulting kernel version 2.6.18-164.15.1.el5.028stab068.5-owl1. Compared to earlier "rhel5" kernels, this update fixes a large number of vulnerabilities of varying impact in various kernel subsystems, which may or may not have been exposed in specific circumstances.