Action not permitted
Modal body text goes here.
CVE-2004-0565
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:25.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20163" }, { "name": "[owl-users] 20040619 Linux 2.4.26-ow2", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "20162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20162" }, { "name": "oval:org.mitre.oval:def:10714", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "10687", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10687" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734" }, { "name": "MDKSA-2004:066", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:066" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20202" }, { "name": "RHSA-2004:504", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "linux-ia64-info-disclosure(16644)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16644" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20338" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-05-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20163" }, { "name": "[owl-users] 20040619 Linux 2.4.26-ow2", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "20162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20162" }, { "name": "oval:org.mitre.oval:def:10714", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "10687", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10687" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734" }, { "name": "MDKSA-2004:066", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:066" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20202" }, { "name": "RHSA-2004:504", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "linux-ia64-info-disclosure(16644)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16644" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20338" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "[owl-users] 20040619 Linux 2.4.26-ow2", "refsource": "MLIST", "url": "http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "20162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20162" }, { "name": "oval:org.mitre.oval:def:10714", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "10687", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10687" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734", "refsource": "MISC", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734" }, { "name": "MDKSA-2004:066", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:066" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "RHSA-2004:504", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "linux-ia64-info-disclosure(16644)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16644" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0565", "datePublished": "2004-07-08T04:00:00", "dateReserved": "2004-06-15T00:00:00", "dateUpdated": "2024-08-08T00:24:25.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-0565\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-12-06T05:00:00.000\",\"lastModified\":\"2017-10-11T01:29:28.480\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.\"},{\"lang\":\"es\",\"value\":\"Fuga de informaci\u00f3n de punto flotante en el c\u00f3digo de cambio de contexto de Linux 2.4.x s\u00f3lo comprueba el bit MFH pero no verifica el propietario de FPH, lo que permite a usuarios locales leer valores de registros de otros procesos estableciendo el bit MFH.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":2.1},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F3F3BB-E004-4FD9-9580-F2D5F3ED3701\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647BA336-5538-4972-9271-383A0EC9378E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4AD30B9-8FBA-48B3-B2B2-014C950B9BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4177C378-7729-46AB-B49B-C6DAED3200E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F0D201-B1DC-4024-AF77-A284673618F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39B3D5AE-05A8-433C-98DD-2711423D3FA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67735E5-E43E-4164-BDB2-ADC6E0288E9F\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/20162\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20163\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20202\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20338\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1067\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1069\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1070\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1082\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2004:066\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-504.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/10687\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/16644\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714\",\"source\":\"cve@mitre.org\"}]}}" } }
var-200407-0196
Vulnerability from variot
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Linux In the kernel, context switch code is used to switch computation processing between threads. Also, ia64 In architecture, FPH ( High-order register of floating point register ) Change information to user mask (UM) In the register MFH Store in register. this FPH If the register is changed, MFH A bit is set in the register. Local attackers who exploit this issue MFH It is possible to read the register values of other processes by creating a program that sets the bits. Also, ia64 In architecture Linux Kernel 2.4.x In certain circumstances, a local attacker could cause a kernel panic, resulting in a system out of service (CAN-2004-0447) Has been reported, but it is unknown at present. still, ia64 Other architectures are not affected by these issues.Please refer to the “Overview” for the impact of this vulnerability. The Linux kernel is reported prone to a data-disclosure vulnerability. Reportedly, this issue may permit a malicious executable to access the contents of floating-point registers that belong to another process. Linux is an open source operating system. Opened by (Arun Sharma) on 2004-05-28 17:46
Description of problem:
Linux 2.4.x and the SLES9/ia64 kernels have a floating point leak.
Version-Release number of selected component (if applicable):
2.4.21-12.EL.
How reproducible:
Run N (= number of cpus) copies of the program secret and one copy of the program check. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA 1069-1 security@debian.org http://www.debian.org/security/ Martin Schulze, Dann Frazier May 20th, 2006 http://www.debian.org/security/faq
Package : kernel-source-2.4.18,kernel-image-2.4.18-1-alpha,kernel-image-2.4.18-1-i386,kernel-image-2.4.18-hppa,kernel-image-2.4.18-powerpc-xfs,kernel-patch-2.4.18-powerpc,kernel-patch-benh Vulnerability : several Problem-Type : local/remote Debian-specific: no CVE IDs : CVE-2004-0427 CVE-2005-0489 CVE-2004-0394 CVE-2004-0447 CVE-2004-0554 CVE-2004-0565 CVE-2004-0685 CVE-2005-0001 CVE-2004-0883 CVE-2004-0949 CVE-2004-1016 CVE-2004-1333 CVE-2004-0997 CVE-2004-1335 CVE-2004-1017 CVE-2005-0124 CVE-2005-0528 CVE-2003-0984 CVE-2004-1070 CVE-2004-1071 CVE-2004-1072 CVE-2004-1073 CVE-2004-1074 CVE-2004-0138 CVE-2004-1068 CVE-2004-1234 CVE-2005-0003 CVE-2004-1235 CVE-2005-0504 CVE-2005-0384 CVE-2005-0135
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2004-0427
A local denial of service vulnerability in do_fork() has been found.
CVE-2005-0489
A local denial of service vulnerability in proc memory handling has
been found.
CVE-2004-0394
A buffer overflow in the panic handling code has been found.
CVE-2004-0447
A local denial of service vulnerability through a null pointer
dereference in the IA64 process handling code has been found.
CVE-2004-0554
A local denial of service vulnerability through an infinite loop in
the signal handler code has been found.
CVE-2004-0685
Unsafe use of copy_to_user in USB drivers may disclose sensitive
information.
CVE-2005-0001
A race condition in the i386 page fault handler may allow privilege
escalation.
CVE-2004-0883
Multiple vulnerabilities in the SMB filesystem code may allow denial
of service of information disclosure.
CVE-2004-0949
An information leak discovered in the SMB filesystem code.
CVE-2004-1016
A local denial of service vulnerability has been found in the SCM layer.
CVE-2004-1333
An integer overflow in the terminal code may allow a local denial of
service vulnerability.
CVE-2004-0997
A local privilege escalation in the MIPS assembly code has been found.
CVE-2004-1335
A memory leak in the ip_options_get() function may lead to denial of
service.
CVE-2004-1017
Multiple overflows exist in the io_edgeport driver which might be usable
as a denial of service attack vector.
CVE-2005-0124
Bryan Fulton reported a bounds checking bug in the coda_pioctl function
which may allow local users to execute arbitrary code or trigger a denial
of service attack.
CVE-2005-0528
A local privilege escalation in the mremap function has been found
CVE-2003-0984
Inproper initialization of the RTC may disclose information.
CVE-2004-1070
Insufficient input sanitising in the load_elf_binary() function may
lead to privilege escalation.
CVE-2004-1071
Incorrect error handling in the binfmt_elf loader may lead to privilege
escalation.
CVE-2004-1072
A buffer overflow in the binfmt_elf loader may lead to privilege
escalation or denial of service.
CVE-2004-1073
The open_exec function may disclose information.
CVE-2004-1074
The binfmt code is vulnerable to denial of service through malformed
a.out binaries.
CVE-2004-0138
A denial of service vulnerability in the ELF loader has been found.
CVE-2004-1068
A programming error in the unix_dgram_recvmsg() function may lead to
privilege escalation.
CVE-2004-1234
The ELF loader is vulnerable to denial of service through malformed
binaries.
CVE-2005-0003
Crafted ELF binaries may lead to privilege escalation, due to
insufficient checking of overlapping memory regions.
CVE-2004-1235
A race condition in the load_elf_library() and binfmt_aout() functions
may allow privilege escalation.
CVE-2005-0504
An integer overflow in the Moxa driver may lead to privilege escalation.
CVE-2005-0384
A remote denial of service vulnerability has been found in the PPP
driver.
The following matrix explains which kernel version for which architecture fix the problems mentioned above:
Debian 3.0 (woody)
Source 2.4.18-14.4
Alpha architecture 2.4.18-15woody1
Intel IA-32 architecture 2.4.18-13.2
HP Precision architecture 62.4
PowerPC architecture 2.4.18-1woody6
PowerPC architecture/XFS 20020329woody1
PowerPC architecture/benh 20020304woody1
Sun Sparc architecture 22woody1
We recommend that you upgrade your kernel package immediately and reboot the machine.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get dist-upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
iD8DBQFEb9YGXm3vHE4uyloRAkhXAJ0e1RmUxVZSbQICFa/j07oKPfWRVwCeMrhj wYGegwosZg6xi3oI77opLQY= =eu/T -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc
Size/MD5 checksum: 692 27f44a0eec5837b0b01d26c6cff392be
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz
Size/MD5 checksum: 27768 6c719a6343c9ea0dad44a736b3842504
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc
Size/MD5 checksum: 792 d7c89c90fad77944ca1c5a18327f31dd
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz
Size/MD5 checksum: 1013866 21b4b677a7a319442c8fe8a4c72eb4c2
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc
Size/MD5 checksum: 672 4c353db091e8edc4395e46cf8d39ec42
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz
Size/MD5 checksum: 71071 7012adde9ba9a573e1be66f0d258721a
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz
Size/MD5 checksum: 32000211 237896fbb45ae652cc9c5cecc9b746da
Architecture independent components:
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb
Size/MD5 checksum: 1521850 75d23c7c54094b1d25d3b708fd644407
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb
Size/MD5 checksum: 1547874 c6881b25e3a5967e0f6f9c351fb88962
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb
Size/MD5 checksum: 1014564 0e89364c2816f5f4519256a8ea367ab6
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb
Size/MD5 checksum: 1785490 c66cef9e87d9a89caeee02af31e3c96d
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb
Size/MD5 checksum: 25902158 321403201a198371fd55c9b8ac4583f7
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb
Size/MD5 checksum: 3923058 db7bbd997410667bec4ac713d81d60ea
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb
Size/MD5 checksum: 4044796 106fcb86485531d96b4fdada61b71405
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb
Size/MD5 checksum: 3831424 347b0c290989f0cc99f3b336c156f61d
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb
Size/MD5 checksum: 3952220 f7dd8326c0ae0b0dee7c46e24023d0a2
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb
Size/MD5 checksum: 3890804 7348a8cd3961190aa2a19f562c96fe2f
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb
Size/MD5 checksum: 2080618 d52d00e7097ae0c8f4ccb6f34656361d
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb
Size/MD5 checksum: 2080830 db7141d3c0d86a43659176f974599cc2
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb
Size/MD5 checksum: 15816 c31e3b72d6eac6f3f99f75ea838e0bf9
These files will probably be moved into the stable distribution on its next update
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200407-0196", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "mandrake linux corporate server", "scope": "eq", "trust": 1.6, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.6, "vendor": "mandrakesoft", "version": "10.0" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.6, "vendor": "mandrakesoft", "version": "9.2" }, { "model": "secure linux", "scope": "eq", "trust": 1.3, "vendor": "trustix", "version": "2.1" }, { "model": "secure linux", "scope": "eq", "trust": 1.3, "vendor": "trustix", "version": "2.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "gentoo", "version": "*" }, { "model": "secure linux", "scope": "eq", "trust": 1.0, "vendor": "trustix", "version": "2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.0" }, { "model": "mandrake multi network firewall", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "8.2" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "9.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "linux mandrake ppc", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.26" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.25" }, { "model": "kernel -ow1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel -pre9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel -ow2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.22" }, { "model": "kernel pre7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.20" }, { "model": "kernel -pre6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel pre-8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18x86" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.17" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.1" }, { "model": "kernel .0-test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test12", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" } ], "sources": [ { "db": "BID", "id": "10687" }, { "db": "JVNDB", "id": "JVNDB-2004-000211" }, { "db": "CNNVD", "id": "CNNVD-200412-044" }, { "db": "NVD", "id": "CVE-2004-0565" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0565" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Arun Sharma", "sources": [ { "db": "PACKETSTORM", "id": "33773" }, { "db": "CNNVD", "id": "CNNVD-200412-044" } ], "trust": 0.7 }, "cve": "CVE-2004-0565", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2004-0565", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-8995", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0565", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-200412-044", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-8995", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-8995" }, { "db": "JVNDB", "id": "JVNDB-2004-000211" }, { "db": "CNNVD", "id": "CNNVD-200412-044" }, { "db": "NVD", "id": "CVE-2004-0565" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit. ------------ This vulnerability information is a summary of multiple vulnerabilities released at the same time. Please note that the contents of vulnerability information other than the title are included. ------------ Linux In the kernel, context switch code is used to switch computation processing between threads. Also, ia64 In architecture, FPH ( High-order register of floating point register ) Change information to user mask (UM) In the register MFH Store in register. this FPH If the register is changed, MFH A bit is set in the register. Local attackers who exploit this issue MFH It is possible to read the register values of other processes by creating a program that sets the bits. Also, ia64 In architecture Linux Kernel 2.4.x In certain circumstances, a local attacker could cause a kernel panic, resulting in a system out of service (CAN-2004-0447) Has been reported, but it is unknown at present. still, ia64 Other architectures are not affected by these issues.Please refer to the \u201cOverview\u201d for the impact of this vulnerability. The Linux kernel is reported prone to a data-disclosure vulnerability. \nReportedly, this issue may permit a malicious executable to access the contents of floating-point registers that belong to another process. Linux is an open source operating system. Opened by (Arun Sharma) on 2004-05-28 17:46\n\nDescription of problem:\n\nLinux 2.4.x and the SLES9/ia64 kernels have a floating point leak. \n\nVersion-Release number of selected component (if applicable):\n\n2.4.21-12.EL. \n\nHow reproducible:\n\nRun N (= number of cpus) copies of the program secret and one copy of\nthe program check. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1069-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze, Dann Frazier\nMay 20th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.18,kernel-image-2.4.18-1-alpha,kernel-image-2.4.18-1-i386,kernel-image-2.4.18-hppa,kernel-image-2.4.18-powerpc-xfs,kernel-patch-2.4.18-powerpc,kernel-patch-benh\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE IDs : CVE-2004-0427 CVE-2005-0489 CVE-2004-0394 CVE-2004-0447 CVE-2004-0554 CVE-2004-0565 CVE-2004-0685 CVE-2005-0001 CVE-2004-0883 CVE-2004-0949 CVE-2004-1016 CVE-2004-1333 CVE-2004-0997 CVE-2004-1335 CVE-2004-1017 CVE-2005-0124 CVE-2005-0528 CVE-2003-0984 CVE-2004-1070 CVE-2004-1071 CVE-2004-1072 CVE-2004-1073 CVE-2004-1074 CVE-2004-0138 CVE-2004-1068 CVE-2004-1234 CVE-2005-0003 CVE-2004-1235 CVE-2005-0504 CVE-2005-0384 CVE-2005-0135\n\nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. The Common Vulnerabilities and Exposures project identifies the\nfollowing problems:\n\n\n CVE-2004-0427\n\n A local denial of service vulnerability in do_fork() has been found. \n\n CVE-2005-0489\n\n A local denial of service vulnerability in proc memory handling has\n been found. \n\n CVE-2004-0394\n\n A buffer overflow in the panic handling code has been found. \n\n CVE-2004-0447\n\n A local denial of service vulnerability through a null pointer\n dereference in the IA64 process handling code has been found. \n\n CVE-2004-0554\n\n A local denial of service vulnerability through an infinite loop in\n the signal handler code has been found. \n\n CVE-2004-0685\n\n Unsafe use of copy_to_user in USB drivers may disclose sensitive\n information. \n\n CVE-2005-0001\n\n A race condition in the i386 page fault handler may allow privilege\n escalation. \n\n CVE-2004-0883\n\n Multiple vulnerabilities in the SMB filesystem code may allow denial\n of service of information disclosure. \n\n CVE-2004-0949\n\n An information leak discovered in the SMB filesystem code. \n\n CVE-2004-1016\n\n A local denial of service vulnerability has been found in the SCM layer. \n\n CVE-2004-1333\n\n An integer overflow in the terminal code may allow a local denial of\n service vulnerability. \n\n CVE-2004-0997\n\n A local privilege escalation in the MIPS assembly code has been found. \n \n CVE-2004-1335\n \n A memory leak in the ip_options_get() function may lead to denial of\n service. \n \n CVE-2004-1017\n\n Multiple overflows exist in the io_edgeport driver which might be usable\n as a denial of service attack vector. \n \n CVE-2005-0124\n\n Bryan Fulton reported a bounds checking bug in the coda_pioctl function\n which may allow local users to execute arbitrary code or trigger a denial\n of service attack. \n\n CVE-2005-0528\n\n A local privilege escalation in the mremap function has been found\n\n CVE-2003-0984\n\n Inproper initialization of the RTC may disclose information. \n\n CVE-2004-1070\n\n Insufficient input sanitising in the load_elf_binary() function may\n lead to privilege escalation. \n\n CVE-2004-1071\n\n Incorrect error handling in the binfmt_elf loader may lead to privilege\n escalation. \n\n CVE-2004-1072\n\n A buffer overflow in the binfmt_elf loader may lead to privilege\n escalation or denial of service. \n\n CVE-2004-1073\n\n The open_exec function may disclose information. \n\n CVE-2004-1074\n\n The binfmt code is vulnerable to denial of service through malformed\n a.out binaries. \n\n CVE-2004-0138\n\n A denial of service vulnerability in the ELF loader has been found. \n\n CVE-2004-1068\n\n A programming error in the unix_dgram_recvmsg() function may lead to\n privilege escalation. \n\n CVE-2004-1234\n\n The ELF loader is vulnerable to denial of service through malformed\n binaries. \n\n CVE-2005-0003\n\n Crafted ELF binaries may lead to privilege escalation, due to \n insufficient checking of overlapping memory regions. \n\n CVE-2004-1235\n\n A race condition in the load_elf_library() and binfmt_aout() functions\n may allow privilege escalation. \n\n CVE-2005-0504\n\n An integer overflow in the Moxa driver may lead to privilege escalation. \n\n CVE-2005-0384\n\n A remote denial of service vulnerability has been found in the PPP\n driver. \n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.0 (woody)\n Source 2.4.18-14.4\n Alpha architecture 2.4.18-15woody1\n Intel IA-32 architecture 2.4.18-13.2\n HP Precision architecture 62.4 \n PowerPC architecture 2.4.18-1woody6\n PowerPC architecture/XFS 20020329woody1 \n PowerPC architecture/benh 20020304woody1\n Sun Sparc architecture 22woody1 \n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. \n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get dist-upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 3.0 alias woody\n- --------------------------------\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.3 (GNU/Linux)\n\niD8DBQFEb9YGXm3vHE4uyloRAkhXAJ0e1RmUxVZSbQICFa/j07oKPfWRVwCeMrhj\nwYGegwosZg6xi3oI77opLQY=\n=eu/T\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n\n\nDebian GNU/Linux 3.0 alias woody\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc\n Size/MD5 checksum: 692 27f44a0eec5837b0b01d26c6cff392be\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz\n Size/MD5 checksum: 27768 6c719a6343c9ea0dad44a736b3842504\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc\n Size/MD5 checksum: 792 d7c89c90fad77944ca1c5a18327f31dd\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz\n Size/MD5 checksum: 1013866 21b4b677a7a319442c8fe8a4c72eb4c2\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc\n Size/MD5 checksum: 672 4c353db091e8edc4395e46cf8d39ec42\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz\n Size/MD5 checksum: 71071 7012adde9ba9a573e1be66f0d258721a\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz\n Size/MD5 checksum: 32000211 237896fbb45ae652cc9c5cecc9b746da\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb\n Size/MD5 checksum: 1521850 75d23c7c54094b1d25d3b708fd644407\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb\n Size/MD5 checksum: 1547874 c6881b25e3a5967e0f6f9c351fb88962\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb\n Size/MD5 checksum: 1014564 0e89364c2816f5f4519256a8ea367ab6\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb\n Size/MD5 checksum: 1785490 c66cef9e87d9a89caeee02af31e3c96d\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb\n Size/MD5 checksum: 25902158 321403201a198371fd55c9b8ac4583f7\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb\n Size/MD5 checksum: 3923058 db7bbd997410667bec4ac713d81d60ea\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb\n Size/MD5 checksum: 4044796 106fcb86485531d96b4fdada61b71405\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb\n Size/MD5 checksum: 3831424 347b0c290989f0cc99f3b336c156f61d\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb\n Size/MD5 checksum: 3952220 f7dd8326c0ae0b0dee7c46e24023d0a2\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb\n Size/MD5 checksum: 3890804 7348a8cd3961190aa2a19f562c96fe2f\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb\n Size/MD5 checksum: 2080618 d52d00e7097ae0c8f4ccb6f34656361d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb\n Size/MD5 checksum: 2080830 db7141d3c0d86a43659176f974599cc2\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb\n Size/MD5 checksum: 15816 c31e3b72d6eac6f3f99f75ea838e0bf9\n\n These files will probably be moved into the stable distribution on\n its next update", "sources": [ { "db": "NVD", "id": "CVE-2004-0565" }, { "db": "JVNDB", "id": "JVNDB-2004-000211" }, { "db": "BID", "id": "10687" }, { "db": "VULHUB", "id": "VHN-8995" }, { "db": "PACKETSTORM", "id": "33773" }, { "db": "PACKETSTORM", "id": "46506" }, { "db": "PACKETSTORM", "id": "46508" }, { "db": "PACKETSTORM", "id": "46509" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0565", "trust": 3.2 }, { "db": "BID", "id": "10687", "trust": 2.8 }, { "db": "SECUNIA", "id": "20202", "trust": 1.7 }, { "db": "SECUNIA", "id": "20338", "trust": 1.7 }, { "db": "SECUNIA", "id": "20162", "trust": 1.7 }, { "db": "SECUNIA", "id": "20163", "trust": 1.7 }, { "db": "XF", "id": "16644", "trust": 1.4 }, { "db": "BID", "id": "10783", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2004-000211", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200412-044", "trust": 0.7 }, { "db": "DEBIAN", "id": "DSA-1069", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1067", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1070", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1082", "trust": 0.6 }, { "db": "XF", "id": "64", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:10714", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2004:504", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2004:066", "trust": 0.6 }, { "db": "MLIST", "id": "[OWL-USERS] 20040619 LINUX 2.4.26-OW2", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "33773", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-8995", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46506", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46508", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46509", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-8995" }, { "db": "BID", "id": "10687" }, { "db": "JVNDB", "id": "JVNDB-2004-000211" }, { "db": "PACKETSTORM", "id": "33773" }, { "db": "PACKETSTORM", "id": "46506" }, { "db": "PACKETSTORM", "id": "46508" }, { "db": "PACKETSTORM", "id": "46509" }, { "db": "CNNVD", "id": "CNNVD-200412-044" }, { "db": "NVD", "id": "CVE-2004-0565" } ] }, "id": "VAR-200407-0196", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-8995" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T20:08:16.659000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "RHSA-2004:504", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2004-504.html" }, { "title": "RHSA-2004:413", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2004-413.html" }, { "title": "RHSA-2004:689", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2004-689.html" }, { "title": "RHSA-2004:689", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2004-689j.html" }, { "title": "RHSA-2004:504", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2004-504j.html" }, { "title": "RHSA-2004:413", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2004-413j.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000211" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0565" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/10687" }, { "trust": 2.0, "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1067" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1069" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1070" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1082" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2004:066" }, { "trust": 1.7, "url": "http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2004-504.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20162" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20163" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20202" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20338" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/16644" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10714" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16644" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0565" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0565" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/10783" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:10714" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0565" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-504.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0489" }, { "trust": 0.3, "url": "http://www.debian.org/security/faq" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0394" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0427" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0554" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0447" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0124" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0001" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0997" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-1333" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0984" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0949" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0883" }, { "trust": 0.3, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.3, "url": "http://security.debian.org/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0685" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-1016" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0528" }, { "trust": 0.3, "url": "http://www.debian.org/security/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-1017" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-1335" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-doc-2.4.16_2.4.16-1woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-headers-2.4.16_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb" } ], "sources": [ { "db": "VULHUB", "id": "VHN-8995" }, { "db": "BID", "id": "10687" }, { "db": "JVNDB", "id": "JVNDB-2004-000211" }, { "db": "PACKETSTORM", "id": "33773" }, { "db": "PACKETSTORM", "id": "46506" }, { "db": "PACKETSTORM", "id": "46508" }, { "db": "PACKETSTORM", "id": "46509" }, { "db": "CNNVD", "id": "CNNVD-200412-044" }, { "db": "NVD", "id": "CVE-2004-0565" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-8995" }, { "db": "BID", "id": "10687" }, { "db": "JVNDB", "id": "JVNDB-2004-000211" }, { "db": "PACKETSTORM", "id": "33773" }, { "db": "PACKETSTORM", "id": "46506" }, { "db": "PACKETSTORM", "id": "46508" }, { "db": "PACKETSTORM", "id": "46509" }, { "db": "CNNVD", "id": "CNNVD-200412-044" }, { "db": "NVD", "id": "CVE-2004-0565" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-12-06T00:00:00", "db": "VULHUB", "id": "VHN-8995" }, { "date": "2004-07-09T00:00:00", "db": "BID", "id": "10687" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000211" }, { "date": "2004-07-12T17:36:00", "db": "PACKETSTORM", "id": "33773" }, { "date": "2006-05-22T06:29:12", "db": "PACKETSTORM", "id": "46506" }, { "date": "2006-05-22T06:33:40", "db": "PACKETSTORM", "id": "46508" }, { "date": "2006-05-22T06:34:27", "db": "PACKETSTORM", "id": "46509" }, { "date": "2004-07-09T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-044" }, { "date": "2004-12-06T05:00:00", "db": "NVD", "id": "CVE-2004-0565" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-11T00:00:00", "db": "VULHUB", "id": "VHN-8995" }, { "date": "2007-01-17T21:30:00", "db": "BID", "id": "10687" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000211" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200412-044" }, { "date": "2017-10-11T01:29:28.480000", "db": "NVD", "id": "CVE-2004-0565" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "10687" }, { "db": "CNNVD", "id": "CNNVD-200412-044" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux Kernel In FPH Vulnerabilities that do not check the process that owns", "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000211" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Design Error", "sources": [ { "db": "BID", "id": "10687" }, { "db": "CNNVD", "id": "CNNVD-200412-044" } ], "trust": 0.9 } }
gsd-2004-0565
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2004-0565", "description": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.", "id": "GSD-2004-0565", "references": [ "https://www.debian.org/security/2006/dsa-1082", "https://www.debian.org/security/2006/dsa-1070", "https://www.debian.org/security/2006/dsa-1067", "https://www.debian.org/security/2006/dsa-1069", "https://access.redhat.com/errata/RHSA-2004:689", "https://access.redhat.com/errata/RHSA-2004:504" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-0565" ], "details": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.", "id": "GSD-2004-0565", "modified": "2023-12-13T01:22:54.322225Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "[owl-users] 20040619 Linux 2.4.26-ow2", "refsource": "MLIST", "url": "http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "20162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20162" }, { "name": "oval:org.mitre.oval:def:10714", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "10687", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10687" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734", "refsource": "MISC", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734" }, { "name": "MDKSA-2004:066", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:066" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "RHSA-2004:504", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "linux-ia64-info-disclosure(16644)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16644" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0565" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734" }, { "name": "[owl-users] 20040619 Linux 2.4.26-ow2", "refsource": "MLIST", "tags": [ "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html" }, { "name": "DSA-1070", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "DSA-1067", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "10687", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/10687" }, { "name": "20162", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20162" }, { "name": "20163", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20163" }, { "name": "RHSA-2004:504", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "20202", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20202" }, { "name": "DSA-1082", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "20338", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20338" }, { "name": "MDKSA-2004:066", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:066" }, { "name": "linux-ia64-info-disclosure(16644)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16644" }, { "name": "oval:org.mitre.oval:def:10714", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:29Z", "publishedDate": "2004-12-06T05:00Z" } } }
rhsa-2004_504
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Itanium kernel packages are now available as part of ongoing\nsupport and maintenance of Red Hat Enterprise Linux version 2.1. This is\nthe sixth regular update.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the sixth regular Itanium kernel update to Red Hat Enterprise Linux\nversion 2.1. This kernel updates several important drivers and fixes a\nnumber of bugs.\n\nThis update includes fixes for several security issues:\n\nPaul Starzetz of iSEC discovered various flaws in the ELF binary\nloader affecting kernels prior to 2.4.28. A local user could use these\nflaws to gain read access to executable-only binaries or possibly gain\nprivileges. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071,\nCAN-2004-1072, and CAN-2004-1073 to these issues.\n\nA missing serialization flaw in unix_dgram_recvmsg was discovered that\naffects kernels prior to 2.4.28. A local user could potentially make\nuse of a race condition in order to gain privileges. (CAN-2004-1068)\n\nSGI discovered a bug in the elf loader that affects kernels before\n2.4.25 which could be triggered by a malformed binary. On\narchitectures other than x86, a local user could create a malicious\nbinary which could cause a denial of service (crash). (CAN-2004-0136)\n\nStefan Esser discovered various flaws including buffer overflows in\nthe smbfs driver affecting kernels before 2.4.28. A local user may be\nable to cause a denial of service (crash) or possibly gain privileges.\nIn order to exploit these flaws the user would need to have control of\na connected smb server. (CAN-2004-0883, CAN-2004-0949)\n\nA floating point information leak was discovered in the ia64 architecture\ncontext switch code in kernels before 2.4.27. A local user could use this\nflaw to read register values of other processes by setting the MFH bit.\n(CAN-2004-0565)\n\nConectiva discovered flaws in certain USB drivers affecting kernels\nbefore 2.4.27 which used the copy_to_user function on uninitialized\nstructures. These flaws could allow local users to read small amounts of\nkernel memory. (CAN-2004-0685)\n\nThe ext3 and jfs code in kernels before 2.4.26 did not properly initialize\njournal descriptor blocks. A privileged local user could read portions of\nkernel memory. (CAN-2004-0177, CAN-2004-0181)\n\nThe following drivers have been updated:\n\n* fusion to 2.05.16.16.02\n* e1000 to 5.3.19-k2\n* e100 to 3.0.27-k2\n\nAll Red Hat Enterprise Linux 2.1 users running Itanium are advised to\nupgrade their kernels to the packages listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:504", "url": "https://access.redhat.com/errata/RHSA-2004:504" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "121034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121034" }, { "category": "external", "summary": "121040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121040" }, { "category": "external", "summary": "124832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=124832" }, { "category": "external", "summary": "126127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126127" }, { "category": "external", "summary": "127385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127385" }, { "category": "external", "summary": "127916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127916" }, { "category": "external", "summary": "127920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127920" }, { "category": "external", "summary": "131493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131493" }, { "category": "external", "summary": "134722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134722" }, { "category": "external", "summary": "134802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134802" }, { "category": "external", "summary": "134876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134876" }, { "category": "external", "summary": "137446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137446" }, { "category": "external", "summary": "138443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138443" }, { "category": "external", "summary": "140712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=140712" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_504.json" } ], "title": "Red Hat Security Advisory: Updated Itanium kernel packages resolve security issues", "tracking": { "current_release_date": "2024-11-21T23:15:04+00:00", "generator": { "date": "2024-11-21T23:15:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:504", "initial_release_date": "2004-12-13T20:17:00+00:00", "revision_history": [ { "date": "2004-12-13T20:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-12-13T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:15:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0138", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617159" } ], "notes": [ { "category": "description", "text": "The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0138" }, { "category": "external", "summary": "RHBZ#1617159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617159" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0138", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0138" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0138", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0138" } ], "release_date": "2004-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0177", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617168" } ], "notes": [ { "category": "description", "text": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0177" }, { "category": "external", "summary": "RHBZ#1617168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0181", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617172" } ], "notes": [ { "category": "description", "text": "The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0181" }, { "category": "external", "summary": "RHBZ#1617172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0181", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0181" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0565", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617231" } ], "notes": [ { "category": "description", "text": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0565" }, { "category": "external", "summary": "RHBZ#1617231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617231" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0565", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565" } ], "release_date": "2004-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "title": "security flaw" }, { "cve": "CVE-2004-0685", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617249" } ], "notes": [ { "category": "description", "text": "Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0685" }, { "category": "external", "summary": "RHBZ#1617249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0685", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685" } ], "release_date": "2003-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "title": "security flaw" }, { "cve": "CVE-2004-0883", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617312" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0883" }, { "category": "external", "summary": "RHBZ#1617312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0883", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0949", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617329" } ], "notes": [ { "category": "description", "text": "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0949" }, { "category": "external", "summary": "RHBZ#1617329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0949", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0949" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1068", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617362" } ], "notes": [ { "category": "description", "text": "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1068" }, { "category": "external", "summary": "RHBZ#1617362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068" } ], "release_date": "2004-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1070", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617363" } ], "notes": [ { "category": "description", "text": "The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1070" }, { "category": "external", "summary": "RHBZ#1617363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1070", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1070" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1071", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617364" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1071" }, { "category": "external", "summary": "RHBZ#1617364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1071", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1072", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617365" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1072" }, { "category": "external", "summary": "RHBZ#1617365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2004_689
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 3 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for several security issues:\n\nPetr Vandrovec discovered a flaw in the 32bit emulation code affecting the\nLinux 2.4 kernel on the AMD64 architecture. A local attacker could use\nthis flaw to gain privileges. The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2004-1144 to this issue.\n\nISEC security research discovered multiple vulnerabilities in the IGMP\nfunctionality which was backported in the Red Hat Enterprise Linux 3\nkernels. These flaws could allow a local user to cause a denial of\nservice (crash) or potentially gain privileges. Where multicast\napplications are being used on a system, these flaws may also allow remote\nusers to cause a denial of service. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1137 to\nthis issue.\n\nISEC security research and Georgi Guninski independantly discovered a flaw\nin the scm_send function in the auxiliary message layer. A local user\ncould create a carefully crafted auxiliary message which could cause a\ndenial of service (system hang). The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2004-1016 to this issue.\n\nA floating point information leak was discovered in the ia64 architecture\ncontext switch code. A local user could use this flaw to read register\nvalues of other processes by setting the MFH bit. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nname CAN-2004-0565 to this issue.\n\nKirill Korotaev found a flaw in load_elf_binary affecting kernels prior to\n2.4.26. A local user could create a carefully crafted binary in such a\nway that it would cause a denial of service (system crash). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nname CAN-2004-1234 to this issue.\n\nThese packages also fix issues in the io_edgeport driver, and a memory leak\nin ip_options_get.\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:689", "url": "https://access.redhat.com/errata/RHSA-2004:689" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "124734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=124734" }, { "category": "external", "summary": "126126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126126" }, { "category": "external", "summary": "142729", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142729" }, { "category": "external", "summary": "142748", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142748" }, { "category": "external", "summary": "142964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142964" }, { "category": "external", "summary": "142965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142965" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_689.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:27:30+00:00", "generator": { "date": "2024-11-21T23:27:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:689", "initial_release_date": "2004-12-23T20:47:00+00:00", "revision_history": [ { "date": "2004-12-23T20:47:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-12-23T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:27:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.ia32e", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e", "product_id": "kernel-0:2.4.21-27.0.1.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.i386", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-27.0.1.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-27.0.1.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.src", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.src", "product_id": "kernel-0:2.4.21-27.0.1.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-source-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.1.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0565", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617231" } ], "notes": [ { "category": "description", "text": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0565" }, { "category": "external", "summary": "RHBZ#1617231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617231" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0565", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565" } ], "release_date": "2004-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "title": "security flaw" }, { "cve": "CVE-2004-1016", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617350" } ], "notes": [ { "category": "description", "text": "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1016" }, { "category": "external", "summary": "RHBZ#1617350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1017", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617351" } ], "notes": [ { "category": "description", "text": "Multiple \"overflows\" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1017" }, { "category": "external", "summary": "RHBZ#1617351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617351" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017" } ], "release_date": "2004-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1137", "discovery_date": "2004-12-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617372" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1137" }, { "category": "external", "summary": "RHBZ#1617372", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617372" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1137", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1137" } ], "release_date": "2004-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1144", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617379" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1144" }, { "category": "external", "summary": "RHBZ#1617379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617379" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1144", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1144" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1144", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1144" } ], "release_date": "2004-12-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1234", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617396" } ], "notes": [ { "category": "description", "text": "load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1234" }, { "category": "external", "summary": "RHBZ#1617396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617396" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1234", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234" } ], "release_date": "2004-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1335", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617408" } ], "notes": [ { "category": "description", "text": "Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1335" }, { "category": "external", "summary": "RHBZ#1617408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617408" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1335", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-23T20:47:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-0:2.4.21-27.0.1.EL.src", "3AS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.1.EL.src", "3Desktop:kernel-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-0:2.4.21-27.0.1.EL.src", "3ES:kernel-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-0:2.4.21-27.0.1.EL.src", "3WS:kernel-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
ghsa-g33f-v4ch-cw4g
Vulnerability from github
Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
{ "affected": [], "aliases": [ "CVE-2004-0565" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2004-12-06T05:00:00Z", "severity": "LOW" }, "details": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.", "id": "GHSA-g33f-v4ch-cw4g", "modified": "2022-04-29T02:57:57Z", "published": "2022-04-29T02:57:57Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16644" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/20162" }, { "type": "WEB", "url": "http://secunia.com/advisories/20163" }, { "type": "WEB", "url": "http://secunia.com/advisories/20202" }, { "type": "WEB", "url": "http://secunia.com/advisories/20338" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:066" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/10687" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.