Action not permitted
Modal body text goes here.
CVE-2009-1630
Vulnerability from cvelistv5
Published
2009-05-14 17:00
Modified
2024-08-07 05:20
Severity ?
EPSS score ?
Summary
The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:20:34.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2009:135", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135" }, { "name": "DSA-1865", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1865" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111" }, { "name": "[linux-nfs] 20090509 [NFS] [PATCH] nfs: Fix NFS v4 client handling of MAY_EXEC in nfs_permission.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://article.gmane.org/gmane.linux.nfs/26592" }, { "name": "34934", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34934" }, { "name": "37471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37471" }, { "name": "[nfsv4] 20061116 Status of execute permissions in NFSv4 ACLs ?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html" }, { "name": "[oss-security] 20090513 CVE request: kernel: problem with NFS v4 client handling of MAY_EXEC in nfs_permission", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/05/13/2" }, { "name": "MDVSA-2009:148", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148" }, { "name": "35656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35656" }, { "name": "oval:org.mitre.oval:def:9990", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990" }, { "name": "DSA-1844", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1844" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "ADV-2009-1331", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1331" }, { "name": "RHSA-2009:1157", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "name": "35106", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35106" }, { "name": "20090724 rPSA-2009-0111-1 kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "36051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36051" }, { "name": "35298", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35298" }, { "name": "36327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36327" }, { "name": "oval:org.mitre.oval:def:8543", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543" }, { "name": "SUSE-SA:2009:031", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugzilla.linux-nfs.org/show_bug.cgi?id=131" }, { "name": "USN-793-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "[nfsv4] 20061117 [Patch] Re: Status of execute permissions in NFSv4 ACLs ?", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html" }, { "name": "SUSE-SA:2009:038", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "35394", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35394" }, { "name": "DSA-1809", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2009/dsa-1809" }, { "name": "35847", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35847" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDVSA-2009:135", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135" }, { "name": "DSA-1865", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1865" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111" }, { "name": "[linux-nfs] 20090509 [NFS] [PATCH] nfs: Fix NFS v4 client handling of MAY_EXEC in nfs_permission.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://article.gmane.org/gmane.linux.nfs/26592" }, { "name": "34934", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34934" }, { "name": "37471", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37471" }, { "name": "[nfsv4] 20061116 Status of execute permissions in NFSv4 ACLs ?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html" }, { "name": "[oss-security] 20090513 CVE request: kernel: problem with NFS v4 client handling of MAY_EXEC in nfs_permission", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/05/13/2" }, { "name": "MDVSA-2009:148", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148" }, { "name": "35656", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35656" }, { "name": "oval:org.mitre.oval:def:9990", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990" }, { "name": "DSA-1844", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1844" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "ADV-2009-1331", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1331" }, { "name": "RHSA-2009:1157", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "name": "35106", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35106" }, { "name": "20090724 rPSA-2009-0111-1 kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "36051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36051" }, { "name": "35298", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35298" }, { "name": "36327", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36327" }, { "name": "oval:org.mitre.oval:def:8543", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543" }, { "name": "SUSE-SA:2009:031", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugzilla.linux-nfs.org/show_bug.cgi?id=131" }, { "name": "USN-793-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "[nfsv4] 20061117 [Patch] Re: Status of execute permissions in NFSv4 ACLs ?", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html" }, { "name": "SUSE-SA:2009:038", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "35394", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35394" }, { "name": "DSA-1809", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2009/dsa-1809" }, { "name": "35847", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35847" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1630", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2009:135", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135" }, { "name": "DSA-1865", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1865" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0111", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111" }, { "name": "[linux-nfs] 20090509 [NFS] [PATCH] nfs: Fix NFS v4 client handling of MAY_EXEC in nfs_permission.", "refsource": "MLIST", "url": "http://article.gmane.org/gmane.linux.nfs/26592" }, { "name": "34934", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34934" }, { "name": "37471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37471" }, { "name": "[nfsv4] 20061116 Status of execute permissions in NFSv4 ACLs ?", "refsource": "MLIST", "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html" }, { "name": "[oss-security] 20090513 CVE request: kernel: problem with NFS v4 client handling of MAY_EXEC in nfs_permission", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/05/13/2" }, { "name": "MDVSA-2009:148", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148" }, { "name": "35656", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35656" }, { "name": "oval:org.mitre.oval:def:9990", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990" }, { "name": "DSA-1844", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1844" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "ADV-2009-1331", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1331" }, { "name": "RHSA-2009:1157", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=500297", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "name": "35106", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35106" }, { "name": "20090724 rPSA-2009-0111-1 kernel", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "36051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36051" }, { "name": "35298", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35298" }, { "name": "36327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36327" }, { "name": "oval:org.mitre.oval:def:8543", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543" }, { "name": "SUSE-SA:2009:031", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "name": "http://bugzilla.linux-nfs.org/show_bug.cgi?id=131", "refsource": "CONFIRM", "url": "http://bugzilla.linux-nfs.org/show_bug.cgi?id=131" }, { "name": "USN-793-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "[nfsv4] 20061117 [Patch] Re: Status of execute permissions in NFSv4 ACLs ?", "refsource": "MLIST", "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html" }, { "name": "SUSE-SA:2009:038", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "35394", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35394" }, { "name": "DSA-1809", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1809" }, { "name": "35847", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35847" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2009-1630", "datePublished": "2009-05-14T17:00:00", "dateReserved": "2009-05-14T00:00:00", "dateUpdated": "2024-08-07T05:20:34.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-1630\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-05-14T17:30:00.780\",\"lastModified\":\"2020-08-21T18:45:27.517\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n nfs_permission en fs/nfs/dir.c en la implementaci\u00f3n cliente NFS en Linux kernel v2.6.29.3 y versiones anteriores, cuando atomic_open est\u00e1 activo, no comprueba la ejecuci\u00f3n (tambi\u00e9n conocido como EXEC or MAY_EXEC) de permisos de bits, lo cual permite a usuarios locales evitar permisos y ejecutar ficheros, como lo demostrado por ficheros en un servidor de ficheros NFSv4.\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.\\n\\nIt was addressed in Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2009-1132.html , https://rhn.redhat.com/errata/RHSA-2009-1106.html , and https://rhn.redhat.com/errata/RHSA-2009-1157.html .\",\"lastModified\":\"2009-09-10T00:00:00\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.4},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.29.3\",\"matchCriteriaId\":\"F8F01798-4A0A-405B-A70E-C858868A49E0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B42AB65-443B-4655-BAEA-4EB4A43D9509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0507E91-567A-41D6-A7E5-5088A39F75FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECFD8D25-7FDF-48DF-8728-5875C44FFB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"902BA958-06AA-4EDF-9F9E-1030083EA361\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFF29100-E124-4416-95CF-18B4246D43F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC337BB7-9A45-4406-A783-851F279130EE\"}]}]}],\"references\":[{\"url\":\"http://article.gmane.org/gmane.linux.nfs/26592\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://bugzilla.linux-nfs.org/show_bug.cgi?id=131\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35106\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35298\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35394\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35656\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35847\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36051\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36327\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/37471\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0111\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1809\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1844\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1865\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:135\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:148\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/05/13/2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1157.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/505254/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/34934\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/usn-793-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1331\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=500297\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-v8g3-vj55-5p7v
Vulnerability from github
Published
2022-05-02 03:27
Modified
2022-05-02 03:27
Details
The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
{ "affected": [], "aliases": [ "CVE-2009-1630" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2009-05-14T17:30:00Z", "severity": "MODERATE" }, "details": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "id": "GHSA-v8g3-vj55-5p7v", "modified": "2022-05-02T03:27:01Z", "published": "2022-05-02T03:27:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990" }, { "type": "WEB", "url": "http://article.gmane.org/gmane.linux.nfs/26592" }, { "type": "WEB", "url": "http://bugzilla.linux-nfs.org/show_bug.cgi?id=131" }, { "type": "WEB", "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html" }, { "type": "WEB", "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/35106" }, { "type": "WEB", "url": "http://secunia.com/advisories/35298" }, { "type": "WEB", "url": "http://secunia.com/advisories/35394" }, { "type": "WEB", "url": "http://secunia.com/advisories/35656" }, { "type": "WEB", "url": "http://secunia.com/advisories/35847" }, { "type": "WEB", "url": "http://secunia.com/advisories/36051" }, { "type": "WEB", "url": "http://secunia.com/advisories/36327" }, { "type": "WEB", "url": "http://secunia.com/advisories/37471" }, { "type": "WEB", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1809" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1844" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1865" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/05/13/2" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/34934" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1331" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/3316" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2009_1132
Vulnerability from csaf_redhat
Published
2009-06-30 08:05
Modified
2024-11-22 03:12
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and various bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
These updated packages fix the following security issues:
* a flaw was found in the Intel PRO/1000 network driver in the Linux
kernel. Frames with sizes near the MTU of an interface may be split across
multiple hardware receive descriptors. Receipt of such a frame could leak
through a validation check, leading to a corruption of the length check. A
remote attacker could use this flaw to send a specially-crafted packet that
would cause a denial of service. (CVE-2009-1385, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* Frank Filz reported the NFSv4 client was missing a file permission check
for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)
* a missing check was found in the hypervisor_callback() function in the
Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
These updated packages also fix the following bugs:
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps, making it possible to bypass the Address Space
Layout Randomization (ASLR) security feature. This update addresses this
issue. (BZ#499549)
* in some situations, the link count was not decreased when renaming unused
files on NFS mounted file systems. This may have resulted in poor
performance. With this update, the link count is decreased in these
situations, the same as is done for other file operations, such as unlink
and rmdir. (BZ#501802)
* tcp_ack() cleared the probes_out variable even if there were outstanding
packets. When low TCP keepalive intervals were used, this bug may have
caused problems, such as connections terminating, when using remote tools
such as rsh and rlogin. (BZ#501754)
* off-by-one errors in the time normalization code could have caused
clock_gettime() to return one billion nanoseconds, rather than adding an
extra second. This bug could have caused the name service cache daemon
(nscd) to consume excessive CPU resources. (BZ#501800)
* a system panic could occur when one thread read "/proc/bus/input/devices"
while another was removing a device. With this update, a mutex has been
added to protect the input_dev_list and input_handler_list variables, which
resolves this issue. (BZ#501804)
* using netdump may have caused a kernel deadlock on some systems.
(BZ#504565)
* the file system mask, which lists capabilities for users with a file
system user ID (fsuid) of 0, was missing the CAP_MKNOD and
CAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with
an fsuid other than 0 to perform actions on some file system types that
would otherwise be prevented. This update adds these capabilities. (BZ#497269)
All Red Hat Enterprise Linux 4 users should upgrade to these updated
packages, which contain backported patches to resolve these issues. Note:
The system must be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and various bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese updated packages fix the following security issues:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service. (CVE-2009-1385, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a missing check was found in the hypervisor_callback() function in the\nLinux kernel provided by the kernel-xen package. This could cause a denial\nof service of a 32-bit guest if an application running in that guest\naccesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nThese updated packages also fix the following bugs:\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps, making it possible to bypass the Address Space\nLayout Randomization (ASLR) security feature. This update addresses this\nissue. (BZ#499549)\n\n* in some situations, the link count was not decreased when renaming unused\nfiles on NFS mounted file systems. This may have resulted in poor\nperformance. With this update, the link count is decreased in these\nsituations, the same as is done for other file operations, such as unlink\nand rmdir. (BZ#501802)\n\n* tcp_ack() cleared the probes_out variable even if there were outstanding\npackets. When low TCP keepalive intervals were used, this bug may have\ncaused problems, such as connections terminating, when using remote tools\nsuch as rsh and rlogin. (BZ#501754)\n\n* off-by-one errors in the time normalization code could have caused\nclock_gettime() to return one billion nanoseconds, rather than adding an\nextra second. This bug could have caused the name service cache daemon\n(nscd) to consume excessive CPU resources. (BZ#501800)\n\n* a system panic could occur when one thread read \"/proc/bus/input/devices\"\nwhile another was removing a device. With this update, a mutex has been\nadded to protect the input_dev_list and input_handler_list variables, which\nresolves this issue. (BZ#501804)\n\n* using netdump may have caused a kernel deadlock on some systems.\n(BZ#504565)\n\n* the file system mask, which lists capabilities for users with a file\nsystem user ID (fsuid) of 0, was missing the CAP_MKNOD and\nCAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users with\nan fsuid other than 0 to perform actions on some file system types that\nwould otherwise be prevented. This update adds these capabilities. (BZ#497269)\n\nAll Red Hat Enterprise Linux 4 users should upgrade to these updated\npackages, which contain backported patches to resolve these issues. Note:\nThe system must be rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1132", "url": "https://access.redhat.com/errata/RHSA-2009:1132" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "499549", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499549" }, { "category": "external", "summary": "500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "501754", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501754" }, { "category": "external", "summary": "501800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501800" }, { "category": "external", "summary": "501802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501802" }, { "category": "external", "summary": "501804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501804" }, { "category": "external", "summary": "502981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981" }, { "category": "external", "summary": "504565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504565" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1132.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:12:53+00:00", "generator": { "date": "2024-11-22T03:12:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1132", "initial_release_date": "2009-06-30T08:05:00+00:00", "revision_history": [ { "date": "2009-06-30T08:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-30T04:06:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:12:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.3.EL.i686", "product": { "name": "kernel-0:2.6.9-89.0.3.EL.i686", "product_id": "kernel-0:2.6.9-89.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.3.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.0.3.EL.x86_64", "product_id": "kernel-0:2.6.9-89.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.3.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.0.3.EL.ia64", "product_id": "kernel-0:2.6.9-89.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.0.3.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.0.3.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.0.3.EL.src", "product": { "name": "kernel-0:2.6.9-89.0.3.EL.src", "product_id": "kernel-0:2.6.9-89.0.3.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.3.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64", "product_id": "kernel-0:2.6.9-89.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.3.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.0.3.EL.s390x", "product_id": "kernel-0:2.6.9-89.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-89.0.3.EL.s390", "product": { "name": "kernel-0:2.6.9-89.0.3.EL.s390", "product_id": "kernel-0:2.6.9-89.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.0.3.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.0.3.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.0.3.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-30T08:05:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1132" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-30T08:05:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1132" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1385", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "502981" } ], "notes": [ { "category": "description", "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000_clean_rx_irq() denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1385" }, { "category": "external", "summary": "RHBZ#502981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385" } ], "release_date": "2007-04-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-30T08:05:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1132" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000_clean_rx_irq() denial of service" }, { "cve": "CVE-2009-1630", "discovery_date": "2009-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500297" } ], "notes": [ { "category": "description", "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1630" }, { "category": "external", "summary": "RHBZ#500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630" } ], "release_date": "2009-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-30T08:05:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1132" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission" }, { "cve": "CVE-2009-1758", "discovery_date": "2009-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500945" } ], "notes": [ { "category": "description", "text": "The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in \"certain address ranges.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: local denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1758" }, { "category": "external", "summary": "RHBZ#500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1758", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758" } ], "release_date": "2009-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-30T08:05:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1132" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-0:2.6.9-89.0.3.EL.src", "4AS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-89.0.3.EL.src", "4Desktop:kernel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-0:2.6.9-89.0.3.EL.src", "4ES:kernel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-0:2.6.9-89.0.3.EL.src", "4WS:kernel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.0.3.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.0.3.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: local denial of service" } ] }
rhsa-2009_1157
Vulnerability from csaf_redhat
Published
2009-07-14 19:11
Modified
2024-11-22 03:12
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
Updated kernel-rt packages that fix several security issues and various
bugs are now available for Red Hat Enterprise MRG 1.1.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* a flaw was found in the Intel PRO/1000 network driver in the Linux
kernel. Frames with sizes near the MTU of an interface may be split across
multiple hardware receive descriptors. Receipt of such a frame could leak
through a validation check, leading to a corruption of the length check. A
remote attacker could use this flaw to send a specially-crafted packet that
would cause a denial of service or code execution. (CVE-2009-1385,
Important)
* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in
the Linux kernel. This driver allowed interfaces using this driver to
receive frames larger than what could be handled. This could lead to a
remote denial of service or code execution. (CVE-2009-1389, Important)
* several flaws were found in the way the Linux kernel CIFS implementation
handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1633, Important)
* Frank Filz reported the NFSv4 client was missing a file permission check
for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)
* a deadlock flaw was found in the Linux kernel splice implementation. This
deadlock could occur during interactions between the
generic_file_splice_write() and splice_from_pipe() functions, possibly
leading to a partial denial of service on the file system partition where
the deadlock occurs. (CVE-2009-1961, Moderate)
Bug fixes:
* a stack buffer used by get_event_name() was not large enough to
accommodate the nul terminator that sprintf() writes. In some cases, this
could lead to an invalid pointer or a kernel panic. With this update, the
function is modified to allow space for the nul terminator. (BZ#503902)
* free_bootmem() was hard-coded to use node 0. This could have caused a
kernel panic during boot on a NUMA system that happens to boot on a node
other than node 0. With this update, free_bootmem() acts on the current
node, resolving this issue. (BZ#503048)
* CPU flag mishandling caused TSC clocksource synchronization to fail (TSC
was marked unstable) on the Intel® microarchitecture (Nehalem). In
addition, TSC clocksource checks added to the 64-bit kernel code are now
present for i386 systems. Also, "/proc/cpuinfo" now shows TSC-related
flags. (BZ#50289, BZ#508756)
* barriers are used to make sure delayed work requested from threads is
processed before continuing. run_workqueue(), however, exited before
processing all barriers, causing threads to wait forever. In a reported
case, this bug caused missing path issues for Device Mapper Multipathing.
(BZ#504133)
* calling pipe() with an invalid address caused a file descriptor leak.
(BZ#509629)
* the code to add "/dev/rtc" contained a printk statement without a log
level prefix. (BZ#510099)
* an extra check has been added to the realtime kernel to avoid a rare
corruption of the FPU (Floating Point Unit) stack, which could occur if a
task using FPU registers was preempted by an interruption. (BZ#509359)
* fix a boot-up problem on HP ProLiant SL2x170z G6 and similar systems by
adding Intel ICH10 controllers back to the ata_piix driver. (BZ#508783)
* converts a UID comparison in AGP to a more secure capability check. By
default, "/dev/agpgart" is accessible only to the root user. (BZ#505493)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix several security issues and various\nbugs are now available for Red Hat Enterprise MRG 1.1.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* a flaw was found in the Intel PRO/1000 network driver in the Linux\nkernel. Frames with sizes near the MTU of an interface may be split across\nmultiple hardware receive descriptors. Receipt of such a frame could leak\nthrough a validation check, leading to a corruption of the length check. A\nremote attacker could use this flaw to send a specially-crafted packet that\nwould cause a denial of service or code execution. (CVE-2009-1385,\nImportant)\n\n* Michael Tokarev reported a flaw in the Realtek r8169 Ethernet driver in\nthe Linux kernel. This driver allowed interfaces using this driver to\nreceive frames larger than what could be handled. This could lead to a\nremote denial of service or code execution. (CVE-2009-1389, Important)\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1633, Important)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a deadlock flaw was found in the Linux kernel splice implementation. This\ndeadlock could occur during interactions between the\ngeneric_file_splice_write() and splice_from_pipe() functions, possibly\nleading to a partial denial of service on the file system partition where\nthe deadlock occurs. (CVE-2009-1961, Moderate)\n\nBug fixes:\n\n* a stack buffer used by get_event_name() was not large enough to\naccommodate the nul terminator that sprintf() writes. In some cases, this\ncould lead to an invalid pointer or a kernel panic. With this update, the\nfunction is modified to allow space for the nul terminator. (BZ#503902)\n\n* free_bootmem() was hard-coded to use node 0. This could have caused a\nkernel panic during boot on a NUMA system that happens to boot on a node\nother than node 0. With this update, free_bootmem() acts on the current\nnode, resolving this issue. (BZ#503048)\n\n* CPU flag mishandling caused TSC clocksource synchronization to fail (TSC\nwas marked unstable) on the Intel\u00ae microarchitecture (Nehalem). In\naddition, TSC clocksource checks added to the 64-bit kernel code are now\npresent for i386 systems. Also, \"/proc/cpuinfo\" now shows TSC-related\nflags. (BZ#50289, BZ#508756)\n\n* barriers are used to make sure delayed work requested from threads is\nprocessed before continuing. run_workqueue(), however, exited before\nprocessing all barriers, causing threads to wait forever. In a reported\ncase, this bug caused missing path issues for Device Mapper Multipathing.\n(BZ#504133)\n\n* calling pipe() with an invalid address caused a file descriptor leak.\n(BZ#509629)\n\n* the code to add \"/dev/rtc\" contained a printk statement without a log\nlevel prefix. (BZ#510099)\n\n* an extra check has been added to the realtime kernel to avoid a rare\ncorruption of the FPU (Floating Point Unit) stack, which could occur if a\ntask using FPU registers was preempted by an interruption. (BZ#509359)\n\n* fix a boot-up problem on HP ProLiant SL2x170z G6 and similar systems by\nadding Intel ICH10 controllers back to the ata_piix driver. (BZ#508783)\n\n* converts a UID comparison in AGP to a more secure capability check. By\ndefault, \"/dev/agpgart\" is accessible only to the root user. (BZ#505493)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1157", "url": "https://access.redhat.com/errata/RHSA-2009:1157" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "502893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502893" }, { "category": "external", "summary": "502981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981" }, { "category": "external", "summary": "503048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503048" }, { "category": "external", "summary": "503474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474" }, { "category": "external", "summary": "503902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503902" }, { "category": "external", "summary": "504133", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504133" }, { "category": "external", "summary": "504726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726" }, { "category": "external", "summary": "505493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=505493" }, { "category": "external", "summary": "509629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=509629" }, { "category": "external", "summary": "510099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510099" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1157.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:12:59+00:00", "generator": { "date": "2024-11-22T03:12:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1157", "initial_release_date": "2009-07-14T19:11:00+00:00", "revision_history": [ { "date": "2009-07-14T19:11:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-07-14T15:11:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:12:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-126.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-126.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-126.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-126.el5rt.src", "product": { "name": "kernel-rt-0:2.6.24.7-126.el5rt.src", "product_id": "kernel-rt-0:2.6.24.7-126.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-126.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-126.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1385", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "502981" } ], "notes": [ { "category": "description", "text": "Integer underflow in the e1000_clean_rx_irq function in drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel before 2.6.30-rc8, the e1000e driver in the Linux kernel, and Intel Wired Ethernet (aka e1000) before 7.5.5 allows remote attackers to cause a denial of service (panic) via a crafted frame size.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000_clean_rx_irq() denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1385" }, { "category": "external", "summary": "RHBZ#502981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502981" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1385", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1385" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1385" } ], "release_date": "2007-04-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-14T19:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1157" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000_clean_rx_irq() denial of service" }, { "cve": "CVE-2009-1389", "discovery_date": "2009-06-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "504726" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r8169: fix crash when large packets are received", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1389" }, { "category": "external", "summary": "RHBZ#504726", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504726" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1389", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1389" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1389" } ], "release_date": "2009-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-14T19:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1157" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: r8169: fix crash when large packets are received" }, { "cve": "CVE-2009-1630", "discovery_date": "2009-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500297" } ], "notes": [ { "category": "description", "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1630" }, { "category": "external", "summary": "RHBZ#500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630" } ], "release_date": "2009-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-14T19:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1157" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission" }, { "cve": "CVE-2009-1633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496572" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1633" }, { "category": "external", "summary": "RHBZ#496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633" } ], "release_date": "2009-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-14T19:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1157" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server" }, { "cve": "CVE-2009-1961", "discovery_date": "2009-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "503474" } ], "notes": [ { "category": "description", "text": "The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: splice local denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect versions of Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise Linux MRG 2.\n\nThis issue was fixed in Red Hat Enterprise Linux MRG 1 via https://rhn.redhat.com/errata/RHSA-2009-1157.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1961" }, { "category": "external", "summary": "RHBZ#503474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1961", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1961" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1961" } ], "release_date": "2009-04-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-07-14T19:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1157" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-126.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-126.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-126.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: splice local denial of service" } ] }
rhsa-2009_1106
Vulnerability from csaf_redhat
Published
2009-06-16 21:21
Modified
2024-11-22 02:59
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* several flaws were found in the way the Linux kernel CIFS implementation
handles Unicode strings. CIFS clients convert Unicode strings sent by a
server to their local character sets, and then write those strings into
memory. If a malicious server sent a long enough string, it could write
past the end of the target memory region and corrupt other memory areas,
possibly leading to a denial of service or privilege escalation on the
client mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)
* the Linux kernel Network File System daemon (nfsd) implementation did not
drop the CAP_MKNOD capability when handling requests from local,
unprivileged users. This flaw could possibly lead to an information leak or
privilege escalation. (CVE-2009-1072, Moderate)
* Frank Filz reported the NFSv4 client was missing a file permission check
for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)
* a missing check was found in the hypervisor_callback() function in the
Linux kernel provided by the kernel-xen package. This could cause a denial
of service of a 32-bit guest if an application running in that guest
accesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and
agp_generic_alloc_pages() functions did not zero out the memory pages they
allocate, which may later be available to user-space processes. This flaw
could possibly lead to an information leak. (CVE-2009-1192, Low)
Bug fixes:
* a race in the NFS client between destroying cached access rights and
unmounting an NFS file system could have caused a system crash. "Busy
inodes" messages may have been logged. (BZ#498653)
* nanosleep() could sleep several milliseconds less than the specified time
on Intel Itanium®-based systems. (BZ#500349)
* LEDs for disk drives in AHCI mode may have displayed a fault state when
there were no faults. (BZ#500120)
* ptrace_do_wait() reported tasks were stopped each time the process doing
the trace called wait(), instead of reporting it once. (BZ#486945)
* epoll_wait() may have caused a system lockup and problems for
applications. (BZ#497322)
* missing capabilities could possibly allow users with an fsuid other than
0 to perform actions on some file system types that would otherwise be
prevented. (BZ#497271)
* on NFS mounted file systems, heavy write loads may have blocked
nfs_getattr() for long periods, causing commands that use stat(2), such as
ls, to hang. (BZ#486926)
* in rare circumstances, if an application performed multiple O_DIRECT
reads per virtual memory page and also performed fork(2), the buffer
storing the result of the I/O may have ended up with invalid data.
(BZ#486921)
* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep
state. (BZ#501742)
* with this update, get_random_int() is more random and no longer uses a
common seed value, reducing the possibility of predicting the values
returned. (BZ#499783)
* the "-fwrapv" flag was added to the gcc build options to prevent gcc from
optimizing away wrapping. (BZ#501751)
* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)
* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver
caused high system load and very bad performance. (BZ#502837)
* "/proc/[pid]/maps" and "/proc/[pid]/smaps" can only be read by processes
able to use the ptrace() call on a given process; however, certain
information from "/proc/[pid]/stat" and "/proc/[pid]/wchan" could be used
to reconstruct memory maps. (BZ#499546)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* several flaws were found in the way the Linux kernel CIFS implementation\nhandles Unicode strings. CIFS clients convert Unicode strings sent by a\nserver to their local character sets, and then write those strings into\nmemory. If a malicious server sent a long enough string, it could write\npast the end of the target memory region and corrupt other memory areas,\npossibly leading to a denial of service or privilege escalation on the\nclient mounting the CIFS share. (CVE-2009-1439, CVE-2009-1633, Important)\n\n* the Linux kernel Network File System daemon (nfsd) implementation did not\ndrop the CAP_MKNOD capability when handling requests from local,\nunprivileged users. This flaw could possibly lead to an information leak or\nprivilege escalation. (CVE-2009-1072, Moderate)\n\n* Frank Filz reported the NFSv4 client was missing a file permission check\nfor the execute bit in some situations. This could allow local,\nunprivileged users to run non-executable files on NFSv4 mounted file\nsystems. (CVE-2009-1630, Moderate)\n\n* a missing check was found in the hypervisor_callback() function in the\nLinux kernel provided by the kernel-xen package. This could cause a denial\nof service of a 32-bit guest if an application running in that guest\naccesses a certain memory location in the kernel. (CVE-2009-1758, Moderate)\n\n* a flaw was found in the AGPGART driver. The agp_generic_alloc_page() and\nagp_generic_alloc_pages() functions did not zero out the memory pages they\nallocate, which may later be available to user-space processes. This flaw\ncould possibly lead to an information leak. (CVE-2009-1192, Low)\n\nBug fixes:\n\n* a race in the NFS client between destroying cached access rights and\nunmounting an NFS file system could have caused a system crash. \"Busy\ninodes\" messages may have been logged. (BZ#498653)\n\n* nanosleep() could sleep several milliseconds less than the specified time\non Intel Itanium\u00ae-based systems. (BZ#500349)\n\n* LEDs for disk drives in AHCI mode may have displayed a fault state when\nthere were no faults. (BZ#500120)\n\n* ptrace_do_wait() reported tasks were stopped each time the process doing\nthe trace called wait(), instead of reporting it once. (BZ#486945)\n\n* epoll_wait() may have caused a system lockup and problems for\napplications. (BZ#497322)\n\n* missing capabilities could possibly allow users with an fsuid other than\n0 to perform actions on some file system types that would otherwise be\nprevented. (BZ#497271)\n\n* on NFS mounted file systems, heavy write loads may have blocked\nnfs_getattr() for long periods, causing commands that use stat(2), such as\nls, to hang. (BZ#486926)\n\n* in rare circumstances, if an application performed multiple O_DIRECT\nreads per virtual memory page and also performed fork(2), the buffer\nstoring the result of the I/O may have ended up with invalid data.\n(BZ#486921)\n\n* when using GFS2, gfs2_quotad may have entered an uninterpretable sleep\nstate. (BZ#501742)\n\n* with this update, get_random_int() is more random and no longer uses a\ncommon seed value, reducing the possibility of predicting the values\nreturned. (BZ#499783)\n\n* the \"-fwrapv\" flag was added to the gcc build options to prevent gcc from\noptimizing away wrapping. (BZ#501751)\n\n* a kernel panic when enabling and disabling iSCSI paths. (BZ#502916)\n\n* using the Broadcom NetXtreme BCM5704 network device with the tg3 driver\ncaused high system load and very bad performance. (BZ#502837)\n\n* \"/proc/[pid]/maps\" and \"/proc/[pid]/smaps\" can only be read by processes\nable to use the ptrace() call on a given process; however, certain\ninformation from \"/proc/[pid]/stat\" and \"/proc/[pid]/wchan\" could be used\nto reconstruct memory maps. (BZ#499546)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1106", "url": "https://access.redhat.com/errata/RHSA-2009:1106" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "486921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486921" }, { "category": "external", "summary": "486926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486926" }, { "category": "external", "summary": "486945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486945" }, { "category": "external", "summary": "491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "497322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497322" }, { "category": "external", "summary": "498653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=498653" }, { "category": "external", "summary": "499546", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499546" }, { "category": "external", "summary": "500120", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500120" }, { "category": "external", "summary": "500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "500349", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500349" }, { "category": "external", "summary": "500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "501742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501742" }, { "category": "external", "summary": "501751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=501751" }, { "category": "external", "summary": "502837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502837" }, { "category": "external", "summary": "502916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=502916" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1106.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:59:29+00:00", "generator": { "date": "2024-11-22T02:59:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2009:1106", "initial_release_date": "2009-06-16T21:21:00+00:00", "revision_history": [ { "date": "2009-06-16T21:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-06-16T18:34:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:59:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.1.14.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.src", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.src", "product_id": "kernel-0:2.6.18-128.1.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_id": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.1.14.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.1.14.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.1.14.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.1.14.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.src" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.1.14.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.1.14.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-1072", "discovery_date": "2009-03-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "491572" } ], "notes": [ { "category": "description", "text": "nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfsd should drop CAP_MKNOD for non-root", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not planned to be fixed in Red Hat Enterprise Linux 2.1 and 3, due to these products being in Production 3 of their maintenance life-cycles, where only qualified security errata of important or critical impact are addressed.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1072" }, { "category": "external", "summary": "RHBZ#491572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1072" } ], "release_date": "2009-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfsd should drop CAP_MKNOD for non-root" }, { "cve": "CVE-2009-1192", "discovery_date": "2009-04-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "497020" } ], "notes": [ { "category": "description", "text": "The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: agp: zero pages before sending to userspace", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1192" }, { "category": "external", "summary": "RHBZ#497020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=497020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1192", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1192" } ], "release_date": "2009-04-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: agp: zero pages before sending to userspace" }, { "cve": "CVE-2009-1439", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "494275" } ], "notes": [ { "category": "description", "text": "Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1439" }, { "category": "external", "summary": "RHBZ#494275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=494275" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1439", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1439" } ], "release_date": "2009-03-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: memory overwrite when saving nativeFileSystem field during mount" }, { "cve": "CVE-2009-1630", "discovery_date": "2009-05-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500297" } ], "notes": [ { "category": "description", "text": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1630" }, { "category": "external", "summary": "RHBZ#500297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1630", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1630" } ], "release_date": "2009-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: fix NFS v4 client handling of MAY_EXEC in nfs_permission" }, { "cve": "CVE-2009-1633", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-04-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "496572" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, and 3.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1633" }, { "category": "external", "summary": "RHBZ#496572", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=496572" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1633", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1633" } ], "release_date": "2009-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: cifs: fix potential buffer overruns when converting unicode strings sent by server" }, { "cve": "CVE-2009-1758", "discovery_date": "2009-05-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "500945" } ], "notes": [ { "category": "description", "text": "The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in \"certain address ranges.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: local denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 2.1, 3, and Red Hat Enterprise MRG.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1758" }, { "category": "external", "summary": "RHBZ#500945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1758", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1758" } ], "release_date": "2009-05-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: local denial of service" }, { "cve": "CVE-2009-3238", "cwe": { "id": "CWE-330", "name": "Use of Insufficiently Random Values" }, "discovery_date": "2009-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "524512" } ], "notes": [ { "category": "description", "text": "The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function\u0027s tendency to \"return the same value over and over again for long stretches of time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: random: add robust get_random_u32, remove weak get_random_int", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3238" }, { "category": "external", "summary": "RHBZ#524512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=524512" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3238", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3238" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3238" } ], "release_date": "2009-05-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-06-16T21:21:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2009:1106" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-0:2.6.18-128.1.14.el5.src", "5Client:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-0:2.6.18-128.1.14.el5.src", "5Server:kernel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-devel-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-doc-0:2.6.18-128.1.14.el5.noarch", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.i386", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-headers-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-128.1.14.el5.s390x", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-128.1.14.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-128.1.14.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: random: add robust get_random_u32, remove weak get_random_int" } ] }
gsd-2009-1630
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2009-1630", "description": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "id": "GSD-2009-1630", "references": [ "https://www.suse.com/security/cve/CVE-2009-1630.html", "https://www.debian.org/security/2009/dsa-1865", "https://www.debian.org/security/2009/dsa-1844", "https://www.debian.org/security/2009/dsa-1809", "https://access.redhat.com/errata/RHSA-2009:1157", "https://access.redhat.com/errata/RHSA-2009:1132", "https://access.redhat.com/errata/RHSA-2009:1106", "https://linux.oracle.com/cve/CVE-2009-1630.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-1630" ], "details": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.", "id": "GSD-2009-1630", "modified": "2023-12-13T01:19:48.203885Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1630", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2009:135", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135" }, { "name": "DSA-1865", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1865" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0111", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111" }, { "name": "[linux-nfs] 20090509 [NFS] [PATCH] nfs: Fix NFS v4 client handling of MAY_EXEC in nfs_permission.", "refsource": "MLIST", "url": "http://article.gmane.org/gmane.linux.nfs/26592" }, { "name": "34934", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34934" }, { "name": "37471", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37471" }, { "name": "[nfsv4] 20061116 Status of execute permissions in NFSv4 ACLs ?", "refsource": "MLIST", "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html" }, { "name": "[oss-security] 20090513 CVE request: kernel: problem with NFS v4 client handling of MAY_EXEC in nfs_permission", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/05/13/2" }, { "name": "MDVSA-2009:148", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148" }, { "name": "35656", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35656" }, { "name": "oval:org.mitre.oval:def:9990", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990" }, { "name": "DSA-1844", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1844" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "ADV-2009-1331", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1331" }, { "name": "RHSA-2009:1157", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=500297", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "name": "35106", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35106" }, { "name": "20090724 rPSA-2009-0111-1 kernel", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "36051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36051" }, { "name": "35298", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35298" }, { "name": "36327", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36327" }, { "name": "oval:org.mitre.oval:def:8543", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543" }, { "name": "SUSE-SA:2009:031", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "name": "http://bugzilla.linux-nfs.org/show_bug.cgi?id=131", "refsource": "CONFIRM", "url": "http://bugzilla.linux-nfs.org/show_bug.cgi?id=131" }, { "name": "USN-793-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "[nfsv4] 20061117 [Patch] Re: Status of execute permissions in NFSv4 ACLs ?", "refsource": "MLIST", "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html" }, { "name": "SUSE-SA:2009:038", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "35394", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35394" }, { "name": "DSA-1809", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2009/dsa-1809" }, { "name": "35847", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35847" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.29.3", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:vmware:esx:2.5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esx:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esx:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2009-1630" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "[linux-nfs] 20090509 [NFS] [PATCH] nfs: Fix NFS v4 client handling of MAY_EXEC in nfs_permission.", "refsource": "MLIST", "tags": [ "Exploit" ], "url": "http://article.gmane.org/gmane.linux.nfs/26592" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=500297", "refsource": "CONFIRM", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=500297" }, { "name": "http://bugzilla.linux-nfs.org/show_bug.cgi?id=131", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "http://bugzilla.linux-nfs.org/show_bug.cgi?id=131" }, { "name": "[oss-security] 20090513 CVE request: kernel: problem with NFS v4 client handling of MAY_EXEC in nfs_permission", "refsource": "MLIST", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2009/05/13/2" }, { "name": "[nfsv4] 20061117 [Patch] Re: Status of execute permissions in NFSv4 ACLs ?", "refsource": "MLIST", "tags": [ "Broken Link" ], "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005323.html" }, { "name": "[nfsv4] 20061116 Status of execute permissions in NFSv4 ACLs ?", "refsource": "MLIST", "tags": [ "Broken Link" ], "url": "http://linux-nfs.org/pipermail/nfsv4/2006-November/005313.html" }, { "name": "34934", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/34934" }, { "name": "35106", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35106" }, { "name": "ADV-2009-1331", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/1331" }, { "name": "DSA-1809", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2009/dsa-1809" }, { "name": "35298", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35298" }, { "name": "35394", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35394" }, { "name": "SUSE-SA:2009:031", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html" }, { "name": "MDVSA-2009:135", "refsource": "MANDRIVA", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:135" }, { "name": "MDVSA-2009:148", "refsource": "MANDRIVA", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:148" }, { "name": "RHSA-2009:1157", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1157.html" }, { "name": "SUSE-SA:2009:038", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00004.html" }, { "name": "36051", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/36051" }, { "name": "DSA-1844", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2009/dsa-1844" }, { "name": "http://wiki.rpath.com/Advisories:rPSA-2009-0111", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0111" }, { "name": "35847", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35847" }, { "name": "36327", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/36327" }, { "name": "DSA-1865", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2009/dsa-1865" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "37471", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/37471" }, { "name": "35656", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/35656" }, { "name": "USN-793-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/usn-793-1" }, { "name": "oval:org.mitre.oval:def:9990", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9990" }, { "name": "oval:org.mitre.oval:def:8543", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8543" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "20090724 rPSA-2009-0111-1 kernel", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/505254/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2020-08-21T18:45Z", "publishedDate": "2009-05-14T17:30Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.