From OpenVZ Virtuozzo Containers Wiki
< Download‎ | kernel‎ | rhel6
Jump to: navigation, search

Warning.svg Warning: this is an old version of RHEL6 kernel. For the latest version, see Download/kernel/rhel6/042stab145.3.
Kernel branch RHEL6
Based on RHEL6 2.6.32
Status stable, maintained
End Of Life Nov 2019
Latest 042stab145.3
Archives RHEL6


Since 042stab139.1:

  • Rebase to RHEL6u10 kernel 2.6.32-754.18.2.el6
  • [Important] A new software page cache side channel attack scenario was discovered in operating systems that implement the very common 'page cache' caching mechanism. A malicious user/process could use 'in memory' page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel. (CVE-2019-5489)
  • [Moderate] The Salsa20 encryption algorithm in the Linux kernel, before 4.14.8, does not correctly handle zero-length inputs. This allows a local attacker the ability to use the AF_ALG-based skcipher interface to cause a denial of service (uninitialized-memory free and kernel crash) or have an unspecified other impact by executing a crafted sequence of system calls that use the blkcipher_walk API. Both the generic implementation (crypto/salsa20_generic.c) and x86 implementation (arch/x86/crypto/salsa20_glue.c) of Salsa20 are vulnerable. (CVE-2017-17805)
  • [Moderate] An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel. An attacker with a local account can trick the stack unwinder code to leak stack contents to userspace. The fix allows only root to inspect the kernel stack of an arbitrary task. (CVE-2018-17972)
  • [Moderate] A Spectre gadget was found in the Linux kernel's implementation of system interrupts. An attacker with local access could use this information to reveal private data through a Spectre like side channel. (CVE-2019-1125)
  • [Moderate] A flaw was found in the Linux kernel, prior to version 5.0.7, in drivers/scsi/megaraid/megaraid_sas_base.c, where a NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds(). An attacker can crash the system if they were able to load the megaraid_sas kernel module and groom memory beforehand, leading to a denial of service (DoS), related to a use-after-free. (CVE-2019-11810, PSBM-94467)
  • Under certain conditions, host can crash in posix_cpu_timer_del(). Kernels from 2.6.32-042stab109.5 are affected. (PSBM-96868)

See also[edit]


x86 (i686, IA32)[edit]

File Date Size
vzkernel-2.6.32-042stab140.1.i686.rpm 2019-08-20 05:56:41 33 Mb
vzkernel-devel-2.6.32-042stab140.1.i686.rpm 2019-08-20 05:56:50 10 Mb
vzkernel-headers-2.6.32-042stab140.1.i686.rpm 2019-08-20 05:56:54 5 Mb
vzkernel-debug-2.6.32-042stab140.1.i686.rpm 2019-08-20 05:56:47 34 Mb
vzkernel-debug-devel-2.6.32-042stab140.1.i686.rpm 2019-08-20 05:56:49 10 Mb
vzkernel-firmware-2.6.32-042stab140.1.noarch.rpm 2019-08-20 05:56:53 33 Mb

x86_64 (AMD64, EM64T)[edit]

File Date Size
vzkernel-2.6.32-042stab140.1.x86_64.rpm 2019-08-20 05:56:46 35 Mb
vzkernel-devel-2.6.32-042stab140.1.x86_64.rpm 2019-08-20 05:56:51 10 Mb
vzkernel-headers-2.6.32-042stab140.1.x86_64.rpm 2019-08-20 05:56:55 5 Mb
vzkernel-debug-2.6.32-042stab140.1.x86_64.rpm 2019-08-20 05:56:48 36 Mb
vzkernel-debug-devel-2.6.32-042stab140.1.x86_64.rpm 2019-08-20 05:56:49 10 Mb
vzkernel-firmware-2.6.32-042stab140.1.noarch.rpm 2019-08-20 05:56:53 33 Mb


File Date Size
vzkernel-2.6.32-042stab140.1.src.rpm 2019-08-20 05:56:45 129 Mb
kernel.spec 2019-08-20 05:49:42 4 Mb


AMD64 (x86_64, EM64T)[edit]

File Date Size
linux-image-2.6.32-openvz-042stab140.1-amd64_1_amd64.deb 2019-08-20 05:48:25 66 Mb
linux-headers-2.6.32-openvz-042stab140.1-amd64_1_amd64.deb 2019-08-20 05:48:23 7 Mb
linux-image-openvz-amd64_042stab140.1_amd64.deb 2019-08-20 05:48:28 3 Kb
linux-source-2.6.32-openvz-042stab140.1-amd64_1_all.deb 2019-08-20 05:48:31 134 Mb

x86 (i686, IA32)[edit]

File Date Size
linux-image-2.6.32-openvz-042stab140.1-i386-686_1_i386.deb 2019-08-20 05:48:28 63 Mb
linux-headers-2.6.32-openvz-042stab140.1-i386_1_i386.deb 2019-08-20 05:48:24 7 Mb
linux-image-openvz-i386_042stab140.1_i386.deb 2019-08-20 05:48:28 3 Kb
linux-source-2.6.32-openvz-042stab140.1-i386_1_all.deb 2019-08-20 05:48:38 134 Mb

Kernel patch[edit]

This patch is applicable to vanilla Linux 2.6.32 kernel (not to 2.6.32.y), available from

File Date Size
patch-042stab140.1-combined.gz (signature) 2019-08-20 05:54:25 89 Mb


Official configs of this OpenVZ kernel used to build binaries.

File Date Size
config-2.6.32-042stab140.1.debug.i686 2019-08-20 05:56:17 111 Kb
config-2.6.32-042stab140.1.debug.x86_64 2019-08-20 05:56:25 107 Kb
config-2.6.32-042stab140.1.i686 2019-08-20 05:55:59 111 Kb
config-2.6.32-042stab140.1.x86_64 2019-08-20 05:56:08 106 Kb


For other rhel6 kernel releases, see download/kernel/rhel6/Archives.

For other kernel branches, see download/kernel.

Kernel branches
Testing / Beta
RHEL6 testing
RHEL5 • RHEL4 • 2.6.32 • 2.6.27 • 2.6.26 • 2.6.24 • 2.6.22 • 2.6.20 • 2.6.18 • 2.6.16 • FC5 • SLES10 • 2.6.8
Versions of rhel6 kernel