Download/kernel/rhel6/042stab075.2

From OpenVZ Virtuozzo Containers Wiki
< Download‎ | kernel‎ | rhel6
Revision as of 16:30, 12 March 2013 by Botinki Kira (talk | contribs) (Automated import of articles)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


Warning.svg Warning: this is an old version of RHEL6 kernel. For the latest version, see Download/kernel/rhel6/042stab145.3.
Kernel branch RHEL6
Based on RHEL6 2.6.32
Status stable, maintained
End Of Life Nov 2019
Latest 042stab145.3
Archives RHEL6

Changes

Since 042stab074.10:

Backported a set of security patches from 2.6.32-358.el6 RHEL6.4 kernel:

  • A race condition was found in the way asynchronous I/O and fallocate() interacted when using the ext4 file system. A local, unprivileged user could use this flaw to expose random data from an extent whose data blocks have not yet been written, and thus contain data from a deleted file. (CVE-2012-4508, Important)
  • A flaw was found in the way the vhost kernel module handled descriptors that spanned multiple regions. A privileged guest user in a KVM guest could use this flaw to crash the host or, potentially, escalate their privileges on the host. (CVE-2013-0311, Important)
  • It was found that the default SCSI command filter does not accommodate commands that overlap across device classes. A privileged guest user could potentially use this flaw to write arbitrary data to a LUN that is passed-through as read-only. (CVE-2012-4542, Moderate)
  • A flaw was found in the way the xen_failsafe_callback() function in the Linux kernel handled the failed iret (interrupt return) instruction notification from the Xen hypervisor. An unprivileged user in a 32-bit para-virtualized guest could use this flaw to crash the guest. (CVE-2013-0190, Moderate)
  • A flaw was found in the way pmd_present() interacted with PROT_NONE memory ranges when transparent hugepages were in use. A local, unprivileged user could use this flaw to crash the system. (CVE-2013-0309, Moderate)
  • A flaw was found in the way CIPSO (Common IP Security Option) IP options were validated when set from user mode. A local user able to set CIPSO IP options on the socket could use this flaw to crash the system. (CVE-2013-0310, Moderate)

See also

RPMS

x86 (i686, IA32)

File Date Size
vzkernel-2.6.32-042stab075.2.i686.rpm 2013-03-11 20:22:13 25 Mb
vzkernel-devel-2.6.32-042stab075.2.i686.rpm 2013-03-11 20:22:20 7 Mb
vzkernel-headers-2.6.32-042stab075.2.i686.rpm 2013-03-11 20:22:21 2 Mb
vzkernel-debug-2.6.32-042stab075.2.i686.rpm 2013-03-11 20:22:18 26 Mb
vzkernel-debug-devel-2.6.32-042stab075.2.i686.rpm 2013-03-11 20:22:20 7 Mb
vzkernel-firmware-2.6.32-042stab075.2.noarch.rpm 2013-03-11 20:22:21 10 Mb


x86_64 (AMD64, EM64T)

File Date Size
vzkernel-2.6.32-042stab075.2.x86_64.rpm 2013-03-11 20:22:17 27 Mb
vzkernel-devel-2.6.32-042stab075.2.x86_64.rpm 2013-03-11 20:22:21 7 Mb
vzkernel-headers-2.6.32-042stab075.2.x86_64.rpm 2013-03-11 20:22:21 2 Mb
vzkernel-debug-2.6.32-042stab075.2.x86_64.rpm 2013-03-11 20:22:19 28 Mb
vzkernel-debug-devel-2.6.32-042stab075.2.x86_64.rpm 2013-03-11 20:22:20 7 Mb
vzkernel-firmware-2.6.32-042stab075.2.noarch.rpm 2013-03-11 20:22:21 10 Mb


Source RPM

File Date Size
vzkernel-2.6.32-042stab075.2.src.rpm 2013-03-11 20:22:16 83 Mb
kernel.spec 2013-03-11 20:18:26 1 Mb


Kernel patch

This patch is applicable to vanilla Linux 2.6.32 kernel (not to 2.6.32.y), available from kernel.org.

File Date Size
patch-042stab075.2-combined.gz (signature) 2013-03-11 20:21:05 34 Mb


Configs

Official configs of this OpenVZ kernel used to build binary RPMS.

File Date Size
config-2.6.32-042stab075.2.debug.i686 2013-03-11 20:21:55 105 Kb
config-2.6.32-042stab075.2.debug.x86_64 2013-03-11 20:22:02 100 Kb
config-2.6.32-042stab075.2.i686 2013-03-11 20:21:38 105 Kb
config-2.6.32-042stab075.2.x86_64 2013-03-11 20:21:46 100 Kb


Archives

For other rhel6 kernel releases, see download/kernel/rhel6/Archives.

For other kernel branches, see download/kernel.

Kernel branches
Stable
Testing / Beta
Old
RHEL6
RHEL6 testing
RHEL5 • RHEL4 • 2.6.32 • 2.6.27 • 2.6.26 • 2.6.24 • 2.6.22 • 2.6.20 • 2.6.18 • 2.6.16 • FC5 • SLES10 • 2.6.8
Versions of rhel6 kernel