Open main menu

OpenVZ Virtuozzo Containers Wiki β

Download/kernel/rhel6/042stab127.2

< Download‎ | kernel‎ | rhel6


Warning.svg Warning: this is an old version of RHEL6 kernel. For the latest version, see Download/kernel/rhel6/042stab145.3.
Kernel branch RHEL6
Based on RHEL6 2.6.32
Status stable, maintained
End Of Life Nov 2019
Latest 042stab145.3
Archives RHEL6

Contents

ChangesEdit

Since 042stab126.2:

  • Rebase to RHEL6u9 kernel 2.6.32-696.18.7.el6
  • [Important] CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715)
  • [Important] CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753)
  • [Important] CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754)
  • A null-pointer dereference in net/rds/rdma.c:__rds_rdma_map() could allow a local attacker to cause denial of service. (PSBM-79750)
  • Start of a container with NFS server inside could result in node crash due to a bug in auth_domain_put(). (PSBM-80028)

See alsoEdit

RPMsEdit

x86 (i686, IA32)Edit

File Date Size
vzkernel-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:32 32 Mb
vzkernel-devel-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:41 10 Mb
vzkernel-headers-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:44 4 Mb
vzkernel-debug-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:38 33 Mb
vzkernel-debug-devel-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:40 10 Mb
vzkernel-firmware-2.6.32-042stab127.2.noarch.rpm 2018-01-06 10:25:43 33 Mb


x86_64 (AMD64, EM64T)Edit

File Date Size
vzkernel-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:37 35 Mb
vzkernel-devel-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:42 10 Mb
vzkernel-headers-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:44 4 Mb
vzkernel-debug-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:39 36 Mb
vzkernel-debug-devel-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:41 10 Mb
vzkernel-firmware-2.6.32-042stab127.2.noarch.rpm 2018-01-06 10:25:43 33 Mb


sourceEdit

File Date Size
vzkernel-2.6.32-042stab127.2.src.rpm 2018-01-06 10:25:35 130 Mb
kernel.spec 2018-01-06 10:20:20 4 Mb


DEBsEdit

AMD64 (x86_64, EM64T)Edit

File Date Size
linux-image-2.6.32-openvz-042stab127.2-amd64_1_amd64.deb 2018-01-06 10:19:35 66 Mb
linux-headers-2.6.32-openvz-042stab127.2-amd64_1_amd64.deb 2018-01-06 10:19:34 7 Mb
linux-image-openvz-amd64_042stab127.2_amd64.deb 2018-01-06 10:19:36 3 Kb
linux-source-2.6.32-openvz-042stab127.2-amd64_1_all.deb 2018-01-06 10:19:38 134 Mb


x86 (i686, IA32)Edit

File Date Size
linux-image-2.6.32-openvz-042stab127.2-i386-686_1_i386.deb 2018-01-06 10:19:36 63 Mb
linux-headers-2.6.32-openvz-042stab127.2-i386_1_i386.deb 2018-01-06 10:19:34 7 Mb
linux-image-openvz-i386_042stab127.2_i386.deb 2018-01-06 10:19:36 3 Kb
linux-source-2.6.32-openvz-042stab127.2-i386_1_all.deb 2018-01-06 10:19:41 134 Mb


Kernel patchEdit

This patch is applicable to vanilla Linux 2.6.32 kernel (not to 2.6.32.y), available from kernel.org.

File Date Size
patch-042stab127.2-combined.gz (signature) 2018-01-06 10:22:56 88 Mb


ConfigsEdit

Official configs of this OpenVZ kernel used to build binaries.

File Date Size
config-2.6.32-042stab127.2.debug.i686 2018-01-06 10:24:27 111 Kb
config-2.6.32-042stab127.2.debug.x86_64 2018-01-06 10:24:34 107 Kb
config-2.6.32-042stab127.2.i686 2018-01-06 10:24:13 111 Kb
config-2.6.32-042stab127.2.x86_64 2018-01-06 10:24:19 106 Kb


ArchivesEdit

For other rhel6 kernel releases, see download/kernel/rhel6/Archives.

For other kernel branches, see download/kernel.

Kernel branches
Stable
Testing / Beta
Old
RHEL6
RHEL6 testing
RHEL5 • RHEL4 • 2.6.32 • 2.6.27 • 2.6.26 • 2.6.24 • 2.6.22 • 2.6.20 • 2.6.18 • 2.6.16 • FC5 • SLES10 • 2.6.8
Versions of rhel6 kernel