Download/kernel/rhel5/028stab121.1
Warning: this is an old version of RHEL5 kernel. For the latest version, see Download/kernel/rhel5/028stab122.4. |
Based on | RHEL5 2.6.18 |
---|---|
Status | frozen, not maintained, stable |
End Of Life | Feb 2018 |
Latest | 028stab122.4 |
Archives | RHEL5 |
Contents
Changes[edit]
Since 028stab120.3:
- Rebase to RHEL5 kernel 2.6.18-417.el5
- A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)
- It was found that stacking a file system over procfs in the Linux kernel could lead to a kernel stack overflow due to deep nesting, as demonstrated by mounting ecryptfs over procfs and creating a recursion by mapping /proc/environ. An unprivileged, local user could potentially use this flaw to escalate their privileges on the system. (CVE-2016-1583, Important)
- An integer overflow flaw was found in the way the Linux kernel's Frame Buffer device implementation mapped kernel memory to user space via the mmap syscall. A local user able to access a frame buffer device file (/dev/fb*) could possibly use this flaw to escalate their privileges on the system. (CVE-2013-2596, Important)
- It was found that the Xen hypervisor x86 CPU emulator implementation did not correctly handle certain instructions with segment overrides, potentially resulting in a memory corruption. A malicious guest user could use this flaw to read arbitrary data relating to other guests, cause a denial of service on the host, or potentially escalate their privileges on the host. (CVE-2015-2151, Important)
See also[edit]
- RHSA-2016-2962
- RHSA-2016-2124
- RHBA-2016-1782
- RHBA-2016-1393
- RHBA-2016-1024
- RHSA-2016-0450
- CVE-2016-7117
- CVE-2016-1583
- CVE-2013-2596
- CVE-2015-2151
RPMs[edit]
You need only one kernel RPM so please choose the appropriate one depending on your hardware:
- If your x86 (i686, IA32) machine has more than 4 GB of RAM, choose
ovzkernel-PAE
RPM. - Otherwise, use the plain kernel RPM (i.e.
ovzkernel
).
For more info, see Kernel flavors.
x86 (i686, IA32)[edit]
File | Date | Size |
---|---|---|
ovzkernel-2.6.18-417.el5.028stab121.1.i686.rpm | 2017-02-06 07:22:58 | 20 Mb |
ovzkernel-devel-2.6.18-417.el5.028stab121.1.i686.rpm | 2017-02-06 07:23:01 | 5 Mb |
ovzkernel-PAE-2.6.18-417.el5.028stab121.1.i686.rpm | 2017-02-06 07:23:02 | 20 Mb |
ovzkernel-PAE-devel-2.6.18-417.el5.028stab121.1.i686.rpm | 2017-02-06 07:23:02 | 5 Mb |
x86_64 (AMD64, EM64T)[edit]
File | Date | Size |
---|---|---|
ovzkernel-2.6.18-417.el5.028stab121.1.x86_64.rpm | 2017-02-06 07:23:01 | 22 Mb |
ovzkernel-devel-2.6.18-417.el5.028stab121.1.x86_64.rpm | 2017-02-06 07:23:01 | 5 Mb |
source[edit]
File | Date | Size |
---|---|---|
ovzkernel-2.6.18-417.el5.028stab121.1.src.rpm | 2017-02-06 07:23:00 | 66 Mb |
ovzkernel-2.6.18-417.el5.028stab121.1.nosrc.rpm | 2017-02-06 07:22:59 | 26 Mb |
kernel-ovz.spec | 2017-02-06 07:13:18 | 395 Kb |
Kernel patch[edit]
This patch is applicable to vanilla Linux 2.6.18 kernel (not to 2.6.18.y), available from kernel.org.
File | Date | Size |
---|---|---|
patch-417.el5.028stab121.1-combined.gz (signature) | 2017-02-06 07:14:21 | 22 Mb |
Configs[edit]
Official configs of this OpenVZ kernel used to build binaries.
File | Date | Size |
---|---|---|
kernel-2.6.18-i686-PAE.config.ovz | 2017-02-06 07:14:51 | 70 Kb |
kernel-2.6.18-i686-ent.config.ovz | 2017-02-06 07:14:51 | 70 Kb |
kernel-2.6.18-i686-xen.config.ovz | 2017-02-06 07:14:51 | 71 Kb |
kernel-2.6.18-i686.config.ovz | 2017-02-06 07:14:51 | 70 Kb |
kernel-2.6.18-ia64.config.ovz | 2017-02-06 07:14:51 | 60 Kb |
kernel-2.6.18-ppc64.config.ovz | 2017-02-06 07:14:51 | 62 Kb |
kernel-2.6.18-x86_64-xen.config.ovz | 2017-02-06 07:14:52 | 70 Kb |
kernel-2.6.18-x86_64.config.ovz | 2017-02-06 07:14:52 | 67 Kb |
Archives[edit]
For other rhel5 kernel releases, see download/kernel/rhel5/Archives.
For other kernel branches, see download/kernel.