From OpenVZ Virtuozzo Containers Wiki
< Download‎ | kernel‎ | rhel6
Revision as of 09:44, 6 September 2017 by Vvs (talk | contribs) (Bot: Automated import of articles)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Warning.svg Warning: this is an old version of RHEL6 kernel. For the latest version, see Download/kernel/rhel6/042stab145.3.
Kernel branch RHEL6
Based on RHEL6 2.6.32
Status stable, maintained
End Of Life Nov 2019
Latest 042stab145.3
Archives RHEL6


Since 042stab123.9:

  • Rebase to RHEL6u9 kernel 2.6.32-696.10.1.el6 (security, bug fixes, and enhancements)
  • [Important] An integer overflow vulnerability in ip6_find_1stfragopt() function was found. A local attacker that has privileges (of CAP_NET_RAW) to open raw socket can cause an infinite loop inside the ip6_find_1stfragopt() function. (CVE-2017-7542)
  • [Important] Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local users to gain privileges or cause a denial of service (list corruption or use-after-free) via simultaneous file-descriptor operations that leverage improper might_cancel queueing. (CVE-2017-10661)
  • [Important] A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets are implemented in the Linux kernel networking subsystem handling synchronization. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. (CVE-2017-1000111)
  • [Important] Andrey Konovalov discovered a race condition in the UDP Fragmentation Offload (UFO) code in the Linux kernel. A local attacker could use this to cause a denial of service or execute arbitrary code. (CVE-2017-1000112)
  • [Moderate] Kernel memory corruption due to a buffer overflow was found in brcmf_cfg80211_mgmt_tx() function in Linux kernels from v3.9-rc1 to v4.13-rc1. The vulnerability can be triggered by sending a crafted NL80211_CMD_FRAME packet via netlink. This flaw is unlikely to be triggered remotely as certain userspace code is needed for this. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely. (CVE-2017-7541)
  • [Moderate] The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to possibly cause a situation where a value may be used after being freed (use after free) which may lead to memory corruption or other unspecified other impact. (CVE-2017-11176)
  • [Moderate] The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. (CVE-2017-14106)
  • Stopping a container with NFS server inside could crash the host with BUG at kernel/bc/dcache.c:370. (PSBM-34802, PSBM-43499, PSBM-68560, OVZ-5610)
  • Under certain circumstances container could crash the host after the skb_under_panic error message. (OVZ-6908)
  • cpt: support for inotify watches on Unix sockets. (OVZ-6918)
  • Ploop improvements.

See also[edit]


x86 (i686, IA32)[edit]

File Date Size
vzkernel-2.6.32-042stab124.2.i686.rpm 2017-09-06 09:35:31 32 Mb
vzkernel-devel-2.6.32-042stab124.2.i686.rpm 2017-09-06 09:35:37 10 Mb
vzkernel-headers-2.6.32-042stab124.2.i686.rpm 2017-09-06 09:35:38 4 Mb
vzkernel-debug-2.6.32-042stab124.2.i686.rpm 2017-09-06 09:35:35 33 Mb
vzkernel-debug-devel-2.6.32-042stab124.2.i686.rpm 2017-09-06 09:35:36 10 Mb
vzkernel-firmware-2.6.32-042stab124.2.noarch.rpm 2017-09-06 09:35:38 33 Mb

x86_64 (AMD64, EM64T)[edit]

File Date Size
vzkernel-2.6.32-042stab124.2.x86_64.rpm 2017-09-06 09:35:34 35 Mb
vzkernel-devel-2.6.32-042stab124.2.x86_64.rpm 2017-09-06 09:35:37 10 Mb
vzkernel-headers-2.6.32-042stab124.2.x86_64.rpm 2017-09-06 09:35:39 4 Mb
vzkernel-debug-2.6.32-042stab124.2.x86_64.rpm 2017-09-06 09:35:36 36 Mb
vzkernel-debug-devel-2.6.32-042stab124.2.x86_64.rpm 2017-09-06 09:35:36 10 Mb
vzkernel-firmware-2.6.32-042stab124.2.noarch.rpm 2017-09-06 09:35:38 33 Mb


File Date Size
vzkernel-2.6.32-042stab124.2.src.rpm 2017-09-06 09:35:34 130 Mb
kernel.spec 2017-09-06 09:31:36 4 Mb


AMD64 (x86_64, EM64T)[edit]

File Date Size
linux-image-2.6.32-openvz-042stab124.2-amd64_1_amd64.deb 2017-09-06 09:30:55 66 Mb
linux-headers-2.6.32-openvz-042stab124.2-amd64_1_amd64.deb 2017-09-06 09:30:54 7 Mb
linux-image-openvz-amd64_042stab124.2_amd64.deb 2017-09-06 09:30:56 3 Kb
linux-source-2.6.32-openvz-042stab124.2-amd64_1_all.deb 2017-09-06 09:30:58 134 Mb

x86 (i686, IA32)[edit]

File Date Size
linux-image-2.6.32-openvz-042stab124.2-i386-686_1_i386.deb 2017-09-06 09:30:56 63 Mb
linux-headers-2.6.32-openvz-042stab124.2-i386_1_i386.deb 2017-09-06 09:30:54 7 Mb
linux-image-openvz-i386_042stab124.2_i386.deb 2017-09-06 09:30:56 3 Kb
linux-source-2.6.32-openvz-042stab124.2-i386_1_all.deb 2017-09-06 09:30:59 134 Mb

Kernel patch[edit]

This patch is applicable to vanilla Linux 2.6.32 kernel (not to 2.6.32.y), available from

File Date Size
patch-042stab124.2-combined.gz (signature) 2017-09-06 09:33:48 88 Mb


Official configs of this OpenVZ kernel used to build binaries.

File Date Size
config-2.6.32-042stab124.2.debug.i686 2017-09-06 09:35:11 111 Kb
config-2.6.32-042stab124.2.debug.x86_64 2017-09-06 09:35:16 107 Kb
config-2.6.32-042stab124.2.i686 2017-09-06 09:35:00 111 Kb
config-2.6.32-042stab124.2.x86_64 2017-09-06 09:35:05 106 Kb


For other rhel6 kernel releases, see download/kernel/rhel6/Archives.

For other kernel branches, see download/kernel.

Kernel branches
Testing / Beta
RHEL6 testing
RHEL5 • RHEL4 • 2.6.32 • 2.6.27 • 2.6.26 • 2.6.24 • 2.6.22 • 2.6.20 • 2.6.18 • 2.6.16 • FC5 • SLES10 • 2.6.8
Versions of rhel6 kernel