Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2012-4535
Vulnerability from cvelistv5
Published
2012-11-21 23:00
Modified
2024-08-06 20:42
Severity ?
EPSS score ?
Summary
Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:42:53.628Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2012:1540", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" }, { "name": "SUSE-SU-2014:0470", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" }, { "name": "55082", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55082" }, { "name": "1027759", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1027759" }, { "name": "[Xen-announce] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html" }, { "name": "51413", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51413" }, { "name": "51200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51200" }, { "name": "GLSA-201309-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "DSA-2582", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2582" }, { "name": "87298", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/87298" }, { "name": "SUSE-SU-2012:1486", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { "name": "[oss-security] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/11/13/1" }, { "name": "openSUSE-SU-2012:1572", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "name": "51468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51468" }, { "name": "xen-vcpu-dos(80022)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022" }, { "name": "SUSE-SU-2012:1487", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { "name": "SUSE-SU-2014:0446", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { "name": "51352", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51352" }, { "name": "51324", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51324" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "56498", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56498" }, { "name": "SUSE-SU-2012:1615", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" }, { "name": "openSUSE-SU-2012:1573", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-11-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an \"inappropriate deadline.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2012:1540", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" }, { "name": "SUSE-SU-2014:0470", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" }, { "name": "55082", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55082" }, { "name": "1027759", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1027759" }, { "name": "[Xen-announce] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html" }, { "name": "51413", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51413" }, { "name": "51200", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51200" }, { "name": "GLSA-201309-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "DSA-2582", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2582" }, { "name": "87298", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/87298" }, { "name": "SUSE-SU-2012:1486", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { "name": "[oss-security] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/11/13/1" }, { "name": "openSUSE-SU-2012:1572", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "name": "51468", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51468" }, { "name": "xen-vcpu-dos(80022)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022" }, { "name": "SUSE-SU-2012:1487", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { "name": "SUSE-SU-2014:0446", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { "name": "51352", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51352" }, { "name": "51324", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51324" }, { "name": "GLSA-201604-03", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "56498", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56498" }, { "name": "SUSE-SU-2012:1615", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" }, { "name": "openSUSE-SU-2012:1573", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-4535", "datePublished": "2012-11-21T23:00:00", "dateReserved": "2012-08-21T00:00:00", "dateUpdated": "2024-08-06T20:42:53.628Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-4535\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-11-21T23:55:02.007\",\"lastModified\":\"2024-11-21T01:43:05.073\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an \\\"inappropriate deadline.\\\"\"},{\"lang\":\"es\",\"value\":\"Xen 3.4 hasta 4.2 y posiblemente versiones anteriores permite a los administradores de sistemas operativos clientes locales causar una denegaci\u00f3n de servicio (bucle infinito en Xen y consumo de CPU f\u00edsica), configurando un VCPU con una \\\"fecha l\u00edmite inapropiada\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":1.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.4,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7D1B7E-C30F-430F-832D-2A405DA1F2D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7C1D0AD-B804-474C-96A3-988BADA0DAD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DCD1F05-9F96-40DD-B506-750E87306325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B6AE42-E1EB-47A8-8FAF-7A93A67EC67F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60BADA43-94D5-4E80-B5C8-D01A0249F13E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"550223A9-B9F1-440A-8C25-9F0F76AF7301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC734D58-96E5-4DD2-8781-F8E0ADB96462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62CEC1BF-1922-410D-BCBA-C58199F574C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"923F2C2B-4A65-4823-B511-D0FEB7C7FAB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1A24DED-B2EC-4D9C-9FA4-DD37EF3E3BFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D532B60-C8DD-4A2F-9D05-E574D23EB754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D83CA8B-8E49-45FA-8FAB-C15052474542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27537DF5-7E0F-463F-BA87-46E329EE07AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA4F978-9145-4FE6-B4F9-15207E52C40A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0AF8EF-6FF6-4E22-B16E-82C9F90C6B00\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/87298\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1540.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/51200\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/51324\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/51352\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/51413\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/51468\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/55082\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201309-24.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2582\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/13/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/56498\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1027759\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/80022\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/87298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1540.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/51200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/51324\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/51352\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/51413\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/51468\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/55082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201309-24.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2582\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/11/13/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/56498\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1027759\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/80022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201604-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2012_1540
Vulnerability from csaf_redhat
Published
2012-12-04 20:48
Modified
2024-11-22 05:59
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
Updated kernel packages that fix multiple security issues, two bugs, and
add two enhancements are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
These packages contain the Linux kernel.
Security fixes:
* A race condition in the way asynchronous I/O and fallocate() interacted
when using ext4 could allow a local, unprivileged user to obtain random
data from a deleted file. (CVE-2012-4508, Important)
* A flaw in the way the Xen hypervisor implementation range checked guest
provided addresses in the XENMEM_exchange hypercall could allow a
malicious, para-virtualized guest administrator to crash the hypervisor or,
potentially, escalate their privileges, allowing them to execute arbitrary
code at the hypervisor level. (CVE-2012-5513, Important)
* A flaw in the Reliable Datagram Sockets (RDS) protocol implementation
could allow a local, unprivileged user to cause a denial of service.
(CVE-2012-2372, Moderate)
* A race condition in the way access to inet->opt ip_options was
synchronized in the Linux kernel's TCP/IP protocol suite implementation.
Depending on the network facing applications running on the system, a
remote attacker could possibly trigger this flaw to cause a denial of
service. A local, unprivileged user could use this flaw to cause a denial
of service regardless of the applications the system runs. (CVE-2012-3552,
Moderate)
* The Xen hypervisor implementation did not properly restrict the period
values used to initialize per VCPU periodic timers. A privileged guest user
could cause an infinite loop on the physical CPU. If the watchdog were
enabled, it would detect said loop and panic the host system.
(CVE-2012-4535, Moderate)
* A flaw in the way the Xen hypervisor implementation handled
set_p2m_entry() error conditions could allow a privileged,
fully-virtualized guest user to crash the hypervisor. (CVE-2012-4537,
Moderate)
Red Hat would like to thank Theodore Ts'o for reporting CVE-2012-4508; the
Xen project for reporting CVE-2012-5513, CVE-2012-4535, and CVE-2012-4537;
and Hafid Lin for reporting CVE-2012-3552. Upstream acknowledges Dmitry
Monakhov as the original reporter of CVE-2012-4508. CVE-2012-2372 was
discovered by Li Honggang of Red Hat.
Bug fixes:
* Previously, the interrupt handlers of the qla2xxx driver could clear
pending interrupts right after the IRQ lines were attached during system
start-up. Consequently, the kernel could miss the interrupt that reported
completion of the link initialization, and the qla2xxx driver then failed
to detect all attached LUNs. With this update, the qla2xxx driver has been
modified to no longer clear interrupt bits after attaching the IRQ lines.
The driver now correctly detects all attached LUNs as expected. (BZ#870118)
* The Ethernet channel bonding driver reported the MII (Media Independent
Interface) status of the bond interface in 802.3ad mode as being up even
though the MII status of all of the slave devices was down. This could pose
a problem if the MII status of the bond interface was used to determine if
failover should occur. With this update, the agg_device_up() function has
been added to the bonding driver, which allows the driver to report the
link status of the bond interface correctly, that is, down when all of its
slaves are down, in the 802.3ad mode. (BZ#877943)
Enhancements:
* This update backports several changes from the latest upstream version of
the bnx2x driver. The most important change, the remote-fault link
detection feature, allows the driver to periodically scan the physical link
layer for remote faults. If the physical link appears to be up and a fault
is detected, the driver indicates that the link is down. When the fault is
cleared, the driver indicates that the link is up again. (BZ#870120)
* The INET socket interface has been modified to send a warning message
when the ip_options structure is allocated directly by a third-party module
using the kmalloc() function. (BZ#874973)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues and add these enhancements. The system must
be rebooted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues, two bugs, and\nadd two enhancements are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages contain the Linux kernel.\n\nSecurity fixes:\n\n* A race condition in the way asynchronous I/O and fallocate() interacted\nwhen using ext4 could allow a local, unprivileged user to obtain random\ndata from a deleted file. (CVE-2012-4508, Important)\n\n* A flaw in the way the Xen hypervisor implementation range checked guest\nprovided addresses in the XENMEM_exchange hypercall could allow a\nmalicious, para-virtualized guest administrator to crash the hypervisor or,\npotentially, escalate their privileges, allowing them to execute arbitrary\ncode at the hypervisor level. (CVE-2012-5513, Important)\n\n* A flaw in the Reliable Datagram Sockets (RDS) protocol implementation\ncould allow a local, unprivileged user to cause a denial of service.\n(CVE-2012-2372, Moderate)\n\n* A race condition in the way access to inet-\u003eopt ip_options was\nsynchronized in the Linux kernel\u0027s TCP/IP protocol suite implementation.\nDepending on the network facing applications running on the system, a\nremote attacker could possibly trigger this flaw to cause a denial of\nservice. A local, unprivileged user could use this flaw to cause a denial\nof service regardless of the applications the system runs. (CVE-2012-3552,\nModerate)\n\n* The Xen hypervisor implementation did not properly restrict the period\nvalues used to initialize per VCPU periodic timers. A privileged guest user\ncould cause an infinite loop on the physical CPU. If the watchdog were\nenabled, it would detect said loop and panic the host system.\n(CVE-2012-4535, Moderate)\n\n* A flaw in the way the Xen hypervisor implementation handled\nset_p2m_entry() error conditions could allow a privileged,\nfully-virtualized guest user to crash the hypervisor. (CVE-2012-4537,\nModerate)\n\nRed Hat would like to thank Theodore Ts\u0027o for reporting CVE-2012-4508; the\nXen project for reporting CVE-2012-5513, CVE-2012-4535, and CVE-2012-4537;\nand Hafid Lin for reporting CVE-2012-3552. Upstream acknowledges Dmitry\nMonakhov as the original reporter of CVE-2012-4508. CVE-2012-2372 was\ndiscovered by Li Honggang of Red Hat.\n\nBug fixes:\n\n* Previously, the interrupt handlers of the qla2xxx driver could clear\npending interrupts right after the IRQ lines were attached during system\nstart-up. Consequently, the kernel could miss the interrupt that reported\ncompletion of the link initialization, and the qla2xxx driver then failed\nto detect all attached LUNs. With this update, the qla2xxx driver has been\nmodified to no longer clear interrupt bits after attaching the IRQ lines.\nThe driver now correctly detects all attached LUNs as expected. (BZ#870118)\n\n* The Ethernet channel bonding driver reported the MII (Media Independent\nInterface) status of the bond interface in 802.3ad mode as being up even\nthough the MII status of all of the slave devices was down. This could pose\na problem if the MII status of the bond interface was used to determine if\nfailover should occur. With this update, the agg_device_up() function has\nbeen added to the bonding driver, which allows the driver to report the\nlink status of the bond interface correctly, that is, down when all of its\nslaves are down, in the 802.3ad mode. (BZ#877943)\n\nEnhancements:\n\n* This update backports several changes from the latest upstream version of\nthe bnx2x driver. The most important change, the remote-fault link\ndetection feature, allows the driver to periodically scan the physical link\nlayer for remote faults. If the physical link appears to be up and a fault\nis detected, the driver indicates that the link is down. When the fault is\ncleared, the driver indicates that the link is up again. (BZ#870120)\n\n* The INET socket interface has been modified to send a warning message\nwhen the ip_options structure is allocated directly by a third-party module\nusing the kmalloc() function. (BZ#874973)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues and add these enhancements. The system must\nbe rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1540", "url": "https://access.redhat.com/errata/RHSA-2012:1540" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "822754", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822754" }, { "category": "external", "summary": "853465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853465" }, { "category": "external", "summary": "869904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869904" }, { "category": "external", "summary": "870086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=870086" }, { "category": "external", "summary": "870101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=870101" }, { "category": "external", "summary": "874973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=874973" }, { "category": "external", "summary": "877391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877391" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1540.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T05:59:49+00:00", "generator": { "date": "2024-11-22T05:59:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1540", "initial_release_date": "2012-12-04T20:48:00+00:00", "revision_history": [ { "date": "2012-12-04T20:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-12-04T20:51:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:59:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-308.24.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-308.24.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-308.24.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-308.24.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-308.24.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-308.24.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-308.24.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-308.24.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-308.24.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-308.24.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-308.24.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-308.24.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-308.24.1.el5.src", "product": { "name": "kernel-0:2.6.18-308.24.1.el5.src", "product_id": "kernel-0:2.6.18-308.24.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-308.24.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-308.24.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-308.24.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-308.24.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-308.24.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-308.24.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-308.24.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-308.24.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-308.24.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-308.24.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-308.24.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-308.24.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-308.24.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-308.24.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-308.24.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-308.24.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-308.24.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-308.24.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-308.24.1.el5.noarch", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-308.24.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-308.24.1.el5.noarch", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "relates_to_product_reference": "5Server-5.8.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Li Honggang" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-2372", "discovery_date": "2012-05-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "822754" } ], "notes": [ { "category": "description", "text": "The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface\u0027s own IP address, as demonstrated by rds-ping.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: rds-ping cause kernel panic", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux MRG. Future kernel updates for Red Hat Enterprise Linux 5 and 6 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2372" }, { "category": "external", "summary": "RHBZ#822754", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822754" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2372", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2372" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2372", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2372" } ], "release_date": "2012-06-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2012:1540" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: rds-ping cause kernel panic" }, { "acknowledgments": [ { "names": [ "Hafid Lin" ] } ], "cve": "CVE-2012-3552", "discovery_date": "2012-06-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "853465" } ], "notes": [ { "category": "description", "text": "Race condition in the IP implementation in the Linux kernel before 3.0 might allow remote attackers to cause a denial of service (slab corruption and system crash) by sending packets to an application that sets socket options during the handling of network traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: slab corruption due to improper synchronization around inet-\u003eopt", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5.\n\nThis issue did affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6.\n\nThis issue did not affect the versions of Linux kernel as shipped with Red Hat Enterpise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-3552" }, { "category": "external", "summary": "RHBZ#853465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=853465" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-3552", "url": "https://www.cve.org/CVERecord?id=CVE-2012-3552" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-3552", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-3552" } ], "release_date": "2011-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2012:1540" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: slab corruption due to improper synchronization around inet-\u003eopt" }, { "acknowledgments": [ { "names": [ "Theodore Ts\u0027o" ] } ], "cve": "CVE-2012-4508", "discovery_date": "2012-10-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "869904" } ], "notes": [ { "category": "description", "text": "Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ext4: AIO vs fallocate stale data exposure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4508" }, { "category": "external", "summary": "RHBZ#869904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4508", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4508" } ], "release_date": "2012-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2012:1540" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ext4: AIO vs fallocate stale data exposure" }, { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-4535", "discovery_date": "2012-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "870086" } ], "notes": [ { "category": "description", "text": "Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an \"inappropriate deadline.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: VCPU timer overflow leads to PCPU deadlock and host death-by-watchdog", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.\n\nThis issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as we did not have support for Xen hypervisor.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4535" }, { "category": "external", "summary": "RHBZ#870086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=870086" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4535", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4535" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4535", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4535" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2012:1540" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: VCPU timer overflow leads to PCPU deadlock and host death-by-watchdog" }, { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-4537", "discovery_date": "2012-10-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "870101" } ], "notes": [ { "category": "description", "text": "Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka \"Memory mapping failure DoS vulnerability.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: Memory mapping failure can crash Xen", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.\n\nThis issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as we did not have support for Xen hypervisor.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-4537" }, { "category": "external", "summary": "RHBZ#870101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=870101" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-4537", "url": "https://www.cve.org/CVERecord?id=CVE-2012-4537" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-4537", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4537" } ], "release_date": "2012-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2012:1540" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: Memory mapping failure can crash Xen" }, { "acknowledgments": [ { "names": [ "Xen project" ] } ], "cve": "CVE-2012-5513", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2012-11-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "877391" } ], "notes": [ { "category": "description", "text": "The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: XENMEM_exchange may overwrite hypervisor memory", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.\n\nThis issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as we did not have support for Xen hypervisor.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5513" }, { "category": "external", "summary": "RHBZ#877391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=877391" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5513", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5513" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5513", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5513" } ], "release_date": "2012-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2012:1540" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 7.4, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Client-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Client-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Client-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.src", "5Server-5.8.Z:kernel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-PAE-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-PAE-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debug-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-debuginfo-common-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-devel-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-doc-0:2.6.18-308.24.1.el5.noarch", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.i386", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-headers-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-debuginfo-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.ppc64", "5Server-5.8.Z:kernel-kdump-devel-0:2.6.18-308.24.1.el5.s390x", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-debuginfo-0:2.6.18-308.24.1.el5.x86_64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.i686", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.ia64", "5Server-5.8.Z:kernel-xen-devel-0:2.6.18-308.24.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: xen: XENMEM_exchange may overwrite hypervisor memory" } ] }
ghsa-cjmp-9gj7-24m6
Vulnerability from github
Published
2022-05-17 01:41
Modified
2022-05-17 01:41
Details
Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
{ "affected": [], "aliases": [ "CVE-2012-4535" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-11-21T23:55:00Z", "severity": "LOW" }, "details": "Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an \"inappropriate deadline.\"", "id": "GHSA-cjmp-9gj7-24m6", "modified": "2022-05-17T01:41:59Z", "published": "2022-05-17T01:41:59Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4535" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201604-03" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" }, { "type": "WEB", "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html" }, { "type": "WEB", "url": "http://osvdb.org/87298" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/51200" }, { "type": "WEB", "url": "http://secunia.com/advisories/51324" }, { "type": "WEB", "url": "http://secunia.com/advisories/51352" }, { "type": "WEB", "url": "http://secunia.com/advisories/51413" }, { "type": "WEB", "url": "http://secunia.com/advisories/51468" }, { "type": "WEB", "url": "http://secunia.com/advisories/55082" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2582" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2012/11/13/1" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/56498" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1027759" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2012-4535
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
Aliases
Aliases
{ "GSD": { "alias": "CVE-2012-4535", "description": "Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an \"inappropriate deadline.\"", "id": "GSD-2012-4535", "references": [ "https://www.suse.com/security/cve/CVE-2012-4535.html", "https://www.debian.org/security/2012/dsa-2582", "https://access.redhat.com/errata/RHSA-2012:1540", "https://linux.oracle.com/cve/CVE-2012-4535.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2012-4535" ], "details": "Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an \"inappropriate deadline.\"", "id": "GSD-2012-4535", "modified": "2023-12-13T01:20:14.567901Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an \"inappropriate deadline.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://secunia.com/advisories/55082", "refsource": "MISC", "url": "http://secunia.com/advisories/55082" }, { "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "name": "http://secunia.com/advisories/51413", "refsource": "MISC", "url": "http://secunia.com/advisories/51413" }, { "name": "https://security.gentoo.org/glsa/201604-03", "refsource": "MISC", "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2012-1540.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" }, { "name": "http://secunia.com/advisories/51200", "refsource": "MISC", "url": "http://secunia.com/advisories/51200" }, { "name": "http://secunia.com/advisories/51324", "refsource": "MISC", "url": "http://secunia.com/advisories/51324" }, { "name": "http://secunia.com/advisories/51352", "refsource": "MISC", "url": "http://secunia.com/advisories/51352" }, { "name": "http://secunia.com/advisories/51468", "refsource": "MISC", "url": "http://secunia.com/advisories/51468" }, { "name": "http://www.debian.org/security/2012/dsa-2582", "refsource": "MISC", "url": "http://www.debian.org/security/2012/dsa-2582" }, { "name": "http://www.securityfocus.com/bid/56498", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/56498" }, { "name": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html", "refsource": "MISC", "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html" }, { "name": "http://osvdb.org/87298", "refsource": "MISC", "url": "http://osvdb.org/87298" }, { "name": "http://www.openwall.com/lists/oss-security/2012/11/13/1", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2012/11/13/1" }, { "name": "http://www.securitytracker.com/id?1027759", "refsource": "MISC", "url": "http://www.securitytracker.com/id?1027759" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-4535" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an \"inappropriate deadline.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2012/11/13/1" }, { "name": "1027759", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1027759" }, { "name": "[Xen-announce] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability", "refsource": "MLIST", "tags": [ "Vendor Advisory" ], "url": "http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html" }, { "name": "87298", "refsource": "OSVDB", "tags": [], "url": "http://osvdb.org/87298" }, { "name": "DSA-2582", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2012/dsa-2582" }, { "name": "SUSE-SU-2012:1615", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html" }, { "name": "51468", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/51468" }, { "name": "RHSA-2012:1540", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1540.html" }, { "name": "SUSE-SU-2012:1487", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html" }, { "name": "openSUSE-SU-2012:1572", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html" }, { "name": "SUSE-SU-2012:1486", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html" }, { "name": "56498", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/56498" }, { "name": "51200", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/51200" }, { "name": "51352", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/51352" }, { "name": "51413", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/51413" }, { "name": "51324", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/51324" }, { "name": "55082", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/55082" }, { "name": "GLSA-201309-24", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "SUSE-SU-2014:0446", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html" }, { "name": "SUSE-SU-2014:0470", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html" }, { "name": "openSUSE-SU-2012:1573", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html" }, { "name": "GLSA-201604-03", "refsource": "GENTOO", "tags": [], "url": "https://security.gentoo.org/glsa/201604-03" }, { "name": "xen-vcpu-dos(80022)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80022" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2017-08-29T01:32Z", "publishedDate": "2012-11-21T23:55Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.