Download/kernel/rhel6/042stab127.2

From OpenVZ Virtuozzo Containers Wiki
< Download‎ | kernel‎ | rhel6
Revision as of 11:28, 6 January 2018 by Vvs (talk | contribs) (Bot: Automated import of articles)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search


Warning.svg Warning: this is an old version of RHEL6 kernel. For the latest version, see Download/kernel/rhel6/042stab145.3.
Kernel branch RHEL6
Based on RHEL6 2.6.32
Status stable, maintained
End Of Life Nov 2019
Latest 042stab145.3
Archives RHEL6

Changes[edit]

Since 042stab126.2:

  • Rebase to RHEL6u9 kernel 2.6.32-696.18.7.el6
  • [Important] CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715)
  • [Important] CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753)
  • [Important] CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754)
  • A null-pointer dereference in net/rds/rdma.c:__rds_rdma_map() could allow a local attacker to cause denial of service. (PSBM-79750)
  • Start of a container with NFS server inside could result in node crash due to a bug in auth_domain_put(). (PSBM-80028)

See also[edit]

RPMs[edit]

x86 (i686, IA32)[edit]

File Date Size
vzkernel-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:32 32 Mb
vzkernel-devel-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:41 10 Mb
vzkernel-headers-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:44 4 Mb
vzkernel-debug-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:38 33 Mb
vzkernel-debug-devel-2.6.32-042stab127.2.i686.rpm 2018-01-06 10:25:40 10 Mb
vzkernel-firmware-2.6.32-042stab127.2.noarch.rpm 2018-01-06 10:25:43 33 Mb


x86_64 (AMD64, EM64T)[edit]

File Date Size
vzkernel-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:37 35 Mb
vzkernel-devel-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:42 10 Mb
vzkernel-headers-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:44 4 Mb
vzkernel-debug-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:39 36 Mb
vzkernel-debug-devel-2.6.32-042stab127.2.x86_64.rpm 2018-01-06 10:25:41 10 Mb
vzkernel-firmware-2.6.32-042stab127.2.noarch.rpm 2018-01-06 10:25:43 33 Mb


source[edit]

File Date Size
vzkernel-2.6.32-042stab127.2.src.rpm 2018-01-06 10:25:35 130 Mb
kernel.spec 2018-01-06 10:20:20 4 Mb


DEBs[edit]

AMD64 (x86_64, EM64T)[edit]

File Date Size
linux-image-2.6.32-openvz-042stab127.2-amd64_1_amd64.deb 2018-01-06 10:19:35 66 Mb
linux-headers-2.6.32-openvz-042stab127.2-amd64_1_amd64.deb 2018-01-06 10:19:34 7 Mb
linux-image-openvz-amd64_042stab127.2_amd64.deb 2018-01-06 10:19:36 3 Kb
linux-source-2.6.32-openvz-042stab127.2-amd64_1_all.deb 2018-01-06 10:19:38 134 Mb


x86 (i686, IA32)[edit]

File Date Size
linux-image-2.6.32-openvz-042stab127.2-i386-686_1_i386.deb 2018-01-06 10:19:36 63 Mb
linux-headers-2.6.32-openvz-042stab127.2-i386_1_i386.deb 2018-01-06 10:19:34 7 Mb
linux-image-openvz-i386_042stab127.2_i386.deb 2018-01-06 10:19:36 3 Kb
linux-source-2.6.32-openvz-042stab127.2-i386_1_all.deb 2018-01-06 10:19:41 134 Mb


Kernel patch[edit]

This patch is applicable to vanilla Linux 2.6.32 kernel (not to 2.6.32.y), available from kernel.org.

File Date Size
patch-042stab127.2-combined.gz (signature) 2018-01-06 10:22:56 88 Mb


Configs[edit]

Official configs of this OpenVZ kernel used to build binaries.

File Date Size
config-2.6.32-042stab127.2.debug.i686 2018-01-06 10:24:27 111 Kb
config-2.6.32-042stab127.2.debug.x86_64 2018-01-06 10:24:34 107 Kb
config-2.6.32-042stab127.2.i686 2018-01-06 10:24:13 111 Kb
config-2.6.32-042stab127.2.x86_64 2018-01-06 10:24:19 106 Kb


Archives[edit]

For other rhel6 kernel releases, see download/kernel/rhel6/Archives.

For other kernel branches, see download/kernel.

Kernel branches
Stable
Testing / Beta
Old
RHEL6
RHEL6 testing
RHEL5 • RHEL4 • 2.6.32 • 2.6.27 • 2.6.26 • 2.6.24 • 2.6.22 • 2.6.20 • 2.6.18 • 2.6.16 • FC5 • SLES10 • 2.6.8
Versions of rhel6 kernel