Action not permitted
Modal body text goes here.
cve-2004-0177
Vulnerability from cvelistv5
Published
2004-04-16 04:00
Modified
2024-08-08 00:10
Severity ?
EPSS score ?
Summary
The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:10:03.548Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "O-127", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/o-127.shtml" }, { "name": "2004-0020", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108213675028441\u0026w=2" }, { "name": "FLSA:2336", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "DSA-482", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-482" }, { "name": "DSA-495", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "DSA-479", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-479" }, { "name": "linux-ext3-info-disclosure(15867)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867" }, { "name": "DSA-480", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-480" }, { "name": "10152", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10152" }, { "name": "CLA-2004:846", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000846" }, { "name": "DSA-489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-489" }, { "name": "DSA-481", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-481" }, { "name": "oval:org.mitre.oval:def:10556", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556" }, { "name": "RHSA-2005:293", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "ESA-20040428-004", "tags": [ "vendor-advisory", "x_refsource_ENGARDE", "x_transferred" ], "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" }, { "name": "RHSA-2004:505", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "O-121", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/o-121.shtml" }, { "name": "O-126", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/o-126.shtml" }, { "name": "RHSA-2004:504", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "MDKSA-2004:029", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029" }, { "name": "GLSA-200407-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "RHSA-2004:166", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2004-166.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://linux.bkbits.net:8080/linux-2.4/cset%404056b368s6vpJbGWxDD_LhQNYQrdzQ" }, { "name": "DSA-491", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-491" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-04-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "O-127", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/o-127.shtml" }, { "name": "2004-0020", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://marc.info/?l=bugtraq\u0026m=108213675028441\u0026w=2" }, { "name": "FLSA:2336", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "DSA-482", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-482" }, { "name": "DSA-495", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "DSA-479", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-479" }, { "name": "linux-ext3-info-disclosure(15867)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867" }, { "name": "DSA-480", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-480" }, { "name": "10152", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10152" }, { "name": "CLA-2004:846", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000846" }, { "name": "DSA-489", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-489" }, { "name": "DSA-481", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-481" }, { "name": "oval:org.mitre.oval:def:10556", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556" }, { "name": "RHSA-2005:293", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "ESA-20040428-004", "tags": [ "vendor-advisory", "x_refsource_ENGARDE" ], "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" }, { "name": "RHSA-2004:505", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "O-121", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/o-121.shtml" }, { "name": "O-126", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/o-126.shtml" }, { "name": "RHSA-2004:504", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "MDKSA-2004:029", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029" }, { "name": "GLSA-200407-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "RHSA-2004:166", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2004-166.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://linux.bkbits.net:8080/linux-2.4/cset%404056b368s6vpJbGWxDD_LhQNYQrdzQ" }, { "name": "DSA-491", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-491" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "O-127", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-127.shtml" }, { "name": "2004-0020", "refsource": "TRUSTIX", "url": "http://marc.info/?l=bugtraq\u0026m=108213675028441\u0026w=2" }, { "name": "FLSA:2336", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "DSA-482", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-482" }, { "name": "DSA-495", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "DSA-479", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-479" }, { "name": "linux-ext3-info-disclosure(15867)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867" }, { "name": "DSA-480", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-480" }, { "name": "10152", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10152" }, { "name": "CLA-2004:846", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000846" }, { "name": "DSA-489", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-489" }, { "name": "DSA-481", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-481" }, { "name": "oval:org.mitre.oval:def:10556", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556" }, { "name": "RHSA-2005:293", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "ESA-20040428-004", "refsource": "ENGARDE", "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" }, { "name": "RHSA-2004:505", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "O-121", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-121.shtml" }, { "name": "O-126", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-126.shtml" }, { "name": "RHSA-2004:504", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "MDKSA-2004:029", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029" }, { "name": "GLSA-200407-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "RHSA-2004:166", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2004-166.html" }, { "name": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ", "refsource": "MISC", "url": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ" }, { "name": "DSA-491", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-491" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0177", "datePublished": "2004-04-16T04:00:00", "dateReserved": "2004-02-25T00:00:00", "dateUpdated": "2024-08-08T00:10:03.548Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-0177\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-06-01T04:00:00.000\",\"lastModified\":\"2023-11-07T01:56:38.223\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.\"},{\"lang\":\"es\",\"value\":\"El c\u00f3digo ext3 en Linux 2.4.x no inicializa adecuadamente bloques de descriptores de diario, lo que causa una fuga de informaci\u00f3n en la que datos de memoria son escritos en el dispositivo de un sistema de ficheros ext3, lo que permite a usuarios privilegiados obtener porciones de la memoria del kernel leyendo directamente del dispositivo.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000846\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://linux.bkbits.net:8080/linux-2.4/cset%404056b368s6vpJbGWxDD_LhQNYQrdzQ\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108213675028441\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2004-166.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200407-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ciac.org/ciac/bulletins/o-121.shtml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ciac.org/ciac/bulletins/o-126.shtml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ciac.org/ciac/bulletins/o-127.shtml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-479\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-480\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-481\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-482\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-489\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-491\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-495\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2004:029\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-504.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-505.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-293.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/10152\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=2336\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/15867\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2004_166
Vulnerability from csaf_redhat
Published
2004-04-21 15:03
Modified
2024-11-21 23:01
Summary
Red Hat Security Advisory: : Updated kernel packages resolve security vulnerabilities
Notes
Topic
Updated kernel packages that fix several minor security vulnerabilities are
now available
Details
The Linux kernel handles the basic functions of the operating system.
iDefense reported a buffer overflow flaw in the ISO9660 filesystem code.
An attacker could create a malicious filesystem in such a way that they
could gain root privileges if that filesystem is mounted. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0109 to this issue.
Solar Designer from OpenWall discovered a minor information leak in the
ext3 filesystem code due to the lack of initialization of journal
descriptor blocks. This flaw has only minor security implications and
exploitation requires privileged access to the raw device. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0177 to this issue.
These packages also contain an updated fix with additional checks for
issues in the R128 Direct Render Infrastructure. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-0003 to this issue.
Additionally, hardening of the mremap function was applied to
prevent a potential local denial of service attack.
All users are advised to upgrade to these errata packages, which contain
backported security patches that correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several minor security vulnerabilities are\nnow available", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\niDefense reported a buffer overflow flaw in the ISO9660 filesystem code. \nAn attacker could create a malicious filesystem in such a way that they\ncould gain root privileges if that filesystem is mounted. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0109 to this issue.\n\nSolar Designer from OpenWall discovered a minor information leak in the\next3 filesystem code due to the lack of initialization of journal\ndescriptor blocks. This flaw has only minor security implications and\nexploitation requires privileged access to the raw device. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0177 to this issue.\n\nThese packages also contain an updated fix with additional checks for\nissues in the R128 Direct Render Infrastructure. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-0003 to this issue.\n\nAdditionally, hardening of the mremap function was applied to\nprevent a potential local denial of service attack.\n\nAll users are advised to upgrade to these errata packages, which contain\nbackported security patches that correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:166", "url": "https://access.redhat.com/errata/RHSA-2004:166" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_166.json" } ], "title": "Red Hat Security Advisory: : Updated kernel packages resolve security vulnerabilities", "tracking": { "current_release_date": "2024-11-21T23:01:43+00:00", "generator": { "date": "2024-11-21T23:01:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:166", "initial_release_date": "2004-04-21T15:03:00+00:00", "revision_history": [ { "date": "2004-04-21T15:03:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-04-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:01:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 9", "product": { "name": "Red Hat Linux 9", "product_id": "Red Hat Linux 9", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:9" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0003", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617130" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to \"R128 DRI limits checking.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0003" }, { "category": "external", "summary": "RHBZ#1617130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617130" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0003" } ], "release_date": "2004-01-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-04-21T15:03:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Linux 9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:166" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0109", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617154" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0109" }, { "category": "external", "summary": "RHBZ#1617154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617154" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0109", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0109" } ], "release_date": "2004-04-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-04-21T15:03:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Linux 9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:166" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0177", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617168" } ], "notes": [ { "category": "description", "text": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 9" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0177" }, { "category": "external", "summary": "RHBZ#1617168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-04-21T15:03:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Linux 9" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:166" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
rhsa-2005_293
Vulnerability from csaf_redhat
Published
2005-04-22 20:17
Modified
2024-11-21 23:40
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 3 kernel are now available.
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
The Linux kernel handles the basic functions of the operating system.
Details
The following security issues were fixed:
The Vicam USB driver did not use the copy_from_user function to access
userspace, crossing security boundaries. (CAN-2004-0075)
The ext3 and jfs code did not properly initialize journal descriptor
blocks. A privileged local user could read portions of kernel memory.
(CAN-2004-0177)
The terminal layer did not properly lock line discipline changes or pending
IO. An unprivileged local user could read portions of kernel memory, or
cause a denial of service (system crash). (CAN-2004-0814)
A race condition was discovered. Local users could use this flaw to read
the environment variables of another process that is still spawning via
/proc/.../cmdline. (CAN-2004-1058)
A flaw in the execve() syscall handling was discovered, allowing a local
user to read setuid ELF binaries that should otherwise be protected by
standard permissions. (CAN-2004-1073). Red Hat originally reported this
as being fixed by RHSA-2004:549, but the associated fix was missing from
that update.
Keith Owens reported a flaw in the Itanium unw_unwind_to_user() function.
A local user could use this flaw to cause a denial of service (system
crash) on the Itanium architecture. (CAN-2005-0135)
A missing Itanium syscall table entry could allow an unprivileged
local user to cause a denial of service (system crash) on the Itanium
architecture. (CAN-2005-0137)
A flaw affecting the OUTS instruction on the AMD64 and Intel EM64T
architectures was discovered. A local user could use this flaw to
access privileged IO ports. (CAN-2005-0204)
A flaw was discovered in the Linux PPP driver. On systems allowing remote
users to connect to a server using ppp, a remote client could cause a
denial of service (system crash). (CAN-2005-0384)
A flaw in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 was
discovered that left a pointer to a freed tty structure. A local user
could potentially use this flaw to cause a denial of service (system crash)
or possibly gain read or write access to ttys that should normally be
prevented. (CAN-2005-0403)
A flaw in fragment queuing was discovered affecting the netfilter
subsystem. On systems configured to filter or process network packets (for
example those configured to do firewalling), a remote attacker could send a
carefully crafted set of fragmented packets to a machine and cause a denial
of service (system crash). In order to sucessfully exploit this flaw, the
attacker would need to know (or guess) some aspects of the firewall ruleset
in place on the target system to be able to craft the right fragmented
packets. (CAN-2005-0449)
Missing validation of an epoll_wait() system call parameter could allow
a local user to cause a denial of service (system crash) on the IBM S/390
and zSeries architectures. (CAN-2005-0736)
A flaw when freeing a pointer in load_elf_library was discovered. A local
user could potentially use this flaw to cause a denial of service (system
crash). (CAN-2005-0749)
A flaw was discovered in the bluetooth driver system. On system where the
bluetooth modules are loaded, a local user could use this flaw to gain
elevated (root) privileges. (CAN-2005-0750)
In addition to the security issues listed above, there was an important
fix made to the handling of the msync() system call for a particular case
in which the call could return without queuing modified mmap()'ed data for
file system update. (BZ 147969)
Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.
Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to
the packages associated with their machine architectures/configurations
Please note that the fix for CAN-2005-0449 required changing the
external symbol linkages (kernel module ABI) for the ip_defrag()
and ip_ct_gather_frags() functions. Any third-party module using either
of these would also need to be fixed.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in the Red Hat\nEnterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.", "title": "Topic" }, { "category": "general", "text": "The following security issues were fixed:\n\nThe Vicam USB driver did not use the copy_from_user function to access\nuserspace, crossing security boundaries. (CAN-2004-0075)\n\nThe ext3 and jfs code did not properly initialize journal descriptor\nblocks. A privileged local user could read portions of kernel memory.\n(CAN-2004-0177)\n\nThe terminal layer did not properly lock line discipline changes or pending\nIO. An unprivileged local user could read portions of kernel memory, or\ncause a denial of service (system crash). (CAN-2004-0814)\n\nA race condition was discovered. Local users could use this flaw to read\nthe environment variables of another process that is still spawning via\n/proc/.../cmdline. (CAN-2004-1058)\n\nA flaw in the execve() syscall handling was discovered, allowing a local\nuser to read setuid ELF binaries that should otherwise be protected by\nstandard permissions. (CAN-2004-1073). Red Hat originally reported this\nas being fixed by RHSA-2004:549, but the associated fix was missing from\nthat update.\n\nKeith Owens reported a flaw in the Itanium unw_unwind_to_user() function.\nA local user could use this flaw to cause a denial of service (system\ncrash) on the Itanium architecture. (CAN-2005-0135)\n\nA missing Itanium syscall table entry could allow an unprivileged\nlocal user to cause a denial of service (system crash) on the Itanium\narchitecture. (CAN-2005-0137)\n\nA flaw affecting the OUTS instruction on the AMD64 and Intel EM64T\narchitectures was discovered. A local user could use this flaw to\naccess privileged IO ports. (CAN-2005-0204)\n\nA flaw was discovered in the Linux PPP driver. On systems allowing remote\nusers to connect to a server using ppp, a remote client could cause a\ndenial of service (system crash). (CAN-2005-0384)\n\nA flaw in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 was\ndiscovered that left a pointer to a freed tty structure. A local user\ncould potentially use this flaw to cause a denial of service (system crash)\nor possibly gain read or write access to ttys that should normally be\nprevented. (CAN-2005-0403)\n\nA flaw in fragment queuing was discovered affecting the netfilter\nsubsystem. On systems configured to filter or process network packets (for\nexample those configured to do firewalling), a remote attacker could send a\ncarefully crafted set of fragmented packets to a machine and cause a denial\nof service (system crash). In order to sucessfully exploit this flaw, the\nattacker would need to know (or guess) some aspects of the firewall ruleset\nin place on the target system to be able to craft the right fragmented\npackets. (CAN-2005-0449)\n\nMissing validation of an epoll_wait() system call parameter could allow\na local user to cause a denial of service (system crash) on the IBM S/390\nand zSeries architectures. (CAN-2005-0736)\n\nA flaw when freeing a pointer in load_elf_library was discovered. A local\nuser could potentially use this flaw to cause a denial of service (system\ncrash). (CAN-2005-0749)\n\nA flaw was discovered in the bluetooth driver system. On system where the\nbluetooth modules are loaded, a local user could use this flaw to gain\nelevated (root) privileges. (CAN-2005-0750)\n\nIn addition to the security issues listed above, there was an important\nfix made to the handling of the msync() system call for a particular case\nin which the call could return without queuing modified mmap()\u0027ed data for\nfile system update. (BZ 147969)\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nRed Hat Enterprise Linux 3 users are advised to upgrade their kernels to\nthe packages associated with their machine architectures/configurations\n\nPlease note that the fix for CAN-2005-0449 required changing the\nexternal symbol linkages (kernel module ABI) for the ip_defrag()\nand ip_ct_gather_frags() functions. Any third-party module using either\nof these would also need to be fixed.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:293", "url": "https://access.redhat.com/errata/RHSA-2005:293" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "121032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121032" }, { "category": "external", "summary": "126407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126407" }, { "category": "external", "summary": "130774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130774" }, { "category": "external", "summary": "131674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131674" }, { "category": "external", "summary": "133108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=133108" }, { "category": "external", "summary": "133113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=133113" }, { "category": "external", "summary": "144059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144059" }, { "category": "external", "summary": "144530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144530" }, { "category": "external", "summary": "147969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147969" }, { "category": "external", "summary": "148855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=148855" }, { "category": "external", "summary": "148869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=148869" }, { "category": "external", "summary": "150334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150334" }, { "category": "external", "summary": "151086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151086" }, { "category": "external", "summary": "151241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151241" }, { "category": "external", "summary": "151805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151805" }, { "category": "external", "summary": "152178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152178" }, { "category": "external", "summary": "152411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152411" }, { "category": "external", "summary": "152552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152552" }, { "category": "external", "summary": "155234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155234" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_293.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:40:04+00:00", "generator": { "date": "2024-11-21T23:40:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:293", "initial_release_date": "2005-04-22T20:17:00+00:00", "revision_history": [ { "date": "2005-04-22T20:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-04-22T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:40:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-27.0.4.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.4.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.4.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.i386", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-27.0.4.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.src", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.src", "product_id": "kernel-0:2.4.21-27.0.4.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.ia32e", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e", "product_id": "kernel-0:2.4.21-27.0.4.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0075", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617137" } ], "notes": [ { "category": "description", "text": "The Vicam USB driver in Linux before 2.4.25 does not use the copy_from_user function when copying data from userspace to kernel space, which crosses security boundaries and allows local users to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0075" }, { "category": "external", "summary": "RHBZ#1617137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0075", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0075" } ], "release_date": "2004-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0177", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617168" } ], "notes": [ { "category": "description", "text": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0177" }, { "category": "external", "summary": "RHBZ#1617168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0814", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617302" } ], "notes": [ { "category": "description", "text": "Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0814" }, { "category": "external", "summary": "RHBZ#1617302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617302" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0814", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0814" } ], "release_date": "2004-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1058", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617360" } ], "notes": [ { "category": "description", "text": "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1058" }, { "category": "external", "summary": "RHBZ#1617360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1058", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058" } ], "release_date": "2004-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0135", "discovery_date": "2005-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617465" } ], "notes": [ { "category": "description", "text": "The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0135" }, { "category": "external", "summary": "RHBZ#1617465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617465" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0135", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0135" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0135", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0135" } ], "release_date": "2005-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0137", "discovery_date": "2005-02-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617467" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6 on Itanium (ia64) architectures allows local users to cause a denial of service via a \"missing Itanium syscall table entry.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0137" }, { "category": "external", "summary": "RHBZ#1617467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617467" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0137", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0137" } ], "release_date": "2005-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0204", "discovery_date": "2005-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617491" } ], "notes": [ { "category": "description", "text": "Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0204" }, { "category": "external", "summary": "RHBZ#1617491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617491" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0204" } ], "release_date": "2005-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0384", "discovery_date": "2005-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617513" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0384" }, { "category": "external", "summary": "RHBZ#1617513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617513" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0384", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0384" } ], "release_date": "2005-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0403", "discovery_date": "2004-09-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617522" } ], "notes": [ { "category": "description", "text": "init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty\u0027s in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0403" }, { "category": "external", "summary": "RHBZ#1617522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0403", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0403" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0403", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0403" } ], "release_date": "2005-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0449", "discovery_date": "2005-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617525" } ], "notes": [ { "category": "description", "text": "The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0449" }, { "category": "external", "summary": "RHBZ#1617525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0449", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0449" } ], "release_date": "2005-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0736", "discovery_date": "2005-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617564" } ], "notes": [ { "category": "description", "text": "Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0736" }, { "category": "external", "summary": "RHBZ#1617564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0736", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0736" } ], "release_date": "2005-03-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0749", "discovery_date": "2005-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617566" } ], "notes": [ { "category": "description", "text": "The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0749" }, { "category": "external", "summary": "RHBZ#1617566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617566" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0749", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0749" } ], "release_date": "2005-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0750", "discovery_date": "2005-03-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617567" } ], "notes": [ { "category": "description", "text": "The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0750" }, { "category": "external", "summary": "RHBZ#1617567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617567" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0750", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0750" } ], "release_date": "2005-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2004_505
Vulnerability from csaf_redhat
Published
2004-12-13 20:06
Modified
2024-11-21 23:15
Summary
Red Hat Security Advisory: Updated kernel packages fix security vulnerability
Notes
Topic
Updated kernel packages are now available as part of ongoing
support and maintenance of Red Hat Enterprise Linux version
2.1. This is the sixth regular update.
Details
The Linux kernel handles the basic functions of the operating
system.
This is the sixth regular kernel update to Red Hat Enterprise Linux version
2.1. It updates a number of device drivers, and adds much improved SATA
support.
This update includes fixes for several security issues:
Paul Starzetz of iSEC discovered various flaws in the ELF binary
loader affecting kernels prior to 2.4.28. A local user could use these
flaws to gain read access to executable-only binaries or possibly gain
privileges. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071,
CAN-2004-1072, and CAN-2004-1073 to these issues.
A missing serialization flaw in unix_dgram_recvmsg was discovered that
affects kernels prior to 2.4.28. A local user could potentially make
use of a race condition in order to gain privileges. (CAN-2004-1068)
Stefan Esser discovered various flaws including buffer overflows in
the smbfs driver affecting kernels before 2.4.28. A local user may be
able to cause a denial of service (crash) or possibly gain privileges.
In order to exploit these flaws the user would need to have control of
a connected smb server. (CAN-2004-0883, CAN-2004-0949)
Conectiva discovered flaws in certain USB drivers affecting kernels
before 2.4.27 which used the copy_to_user function on uninitialized
structures. These flaws could allow local users to read small
amounts of kernel memory. (CAN-2004-0685)
The ext3 code in kernels before 2.4.26 did not properly initialize journal
descriptor blocks. A privileged local user could read portions of kernel
memory. (CAN-2004-0177)
The following drivers have also been updated:
* tg3 v3.10
* e1000 v5.3.19-k2
* e100 v3.0.27-k2
* megaraid
* megaraid2 v2.10.8.2
All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing\nsupport and maintenance of Red Hat Enterprise Linux version\n2.1. This is the sixth regular update.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating\nsystem.\n\nThis is the sixth regular kernel update to Red Hat Enterprise Linux version\n2.1. It updates a number of device drivers, and adds much improved SATA\nsupport.\n\nThis update includes fixes for several security issues:\n\nPaul Starzetz of iSEC discovered various flaws in the ELF binary\nloader affecting kernels prior to 2.4.28. A local user could use these\nflaws to gain read access to executable-only binaries or possibly gain\nprivileges. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071,\nCAN-2004-1072, and CAN-2004-1073 to these issues.\n\nA missing serialization flaw in unix_dgram_recvmsg was discovered that\naffects kernels prior to 2.4.28. A local user could potentially make\nuse of a race condition in order to gain privileges. (CAN-2004-1068)\n\nStefan Esser discovered various flaws including buffer overflows in\nthe smbfs driver affecting kernels before 2.4.28. A local user may be\nable to cause a denial of service (crash) or possibly gain privileges.\nIn order to exploit these flaws the user would need to have control of\na connected smb server. (CAN-2004-0883, CAN-2004-0949)\n\nConectiva discovered flaws in certain USB drivers affecting kernels\nbefore 2.4.27 which used the copy_to_user function on uninitialized\nstructures. These flaws could allow local users to read small\namounts of kernel memory. (CAN-2004-0685)\n\nThe ext3 code in kernels before 2.4.26 did not properly initialize journal\ndescriptor blocks. A privileged local user could read portions of kernel\nmemory. (CAN-2004-0177)\n\nThe following drivers have also been updated:\n\n* tg3 v3.10\n* e1000 v5.3.19-k2\n* e100 v3.0.27-k2\n* megaraid \n* megaraid2 v2.10.8.2\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:505", "url": "https://access.redhat.com/errata/RHSA-2004:505" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "75090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=75090" }, { "category": "external", "summary": "99025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=99025" }, { "category": "external", "summary": "111219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=111219" }, { "category": "external", "summary": "121033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121033" }, { "category": "external", "summary": "127916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127916" }, { "category": "external", "summary": "127919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127919" }, { "category": "external", "summary": "129359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129359" }, { "category": "external", "summary": "131493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131493" }, { "category": "external", "summary": "131534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131534" }, { "category": "external", "summary": "134721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134721" }, { "category": "external", "summary": "134802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134802" }, { "category": "external", "summary": "134875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134875" }, { "category": "external", "summary": "137446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137446" }, { "category": "external", "summary": "138443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138443" }, { "category": "external", "summary": "140711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=140711" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_505.json" } ], "title": "Red Hat Security Advisory: Updated kernel packages fix security vulnerability", "tracking": { "current_release_date": "2024-11-21T23:15:08+00:00", "generator": { "date": "2024-11-21T23:15:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:505", "initial_release_date": "2004-12-13T20:06:00+00:00", "revision_history": [ { "date": "2004-12-13T20:06:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-12-13T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:15:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0177", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617168" } ], "notes": [ { "category": "description", "text": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0177" }, { "category": "external", "summary": "RHBZ#1617168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0685", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617249" } ], "notes": [ { "category": "description", "text": "Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0685" }, { "category": "external", "summary": "RHBZ#1617249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0685", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685" } ], "release_date": "2003-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "title": "security flaw" }, { "cve": "CVE-2004-0883", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617312" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0883" }, { "category": "external", "summary": "RHBZ#1617312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0883", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0949", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617329" } ], "notes": [ { "category": "description", "text": "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0949" }, { "category": "external", "summary": "RHBZ#1617329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0949", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0949" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1068", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617362" } ], "notes": [ { "category": "description", "text": "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1068" }, { "category": "external", "summary": "RHBZ#1617362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068" } ], "release_date": "2004-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1070", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617363" } ], "notes": [ { "category": "description", "text": "The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1070" }, { "category": "external", "summary": "RHBZ#1617363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1070", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1070" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1071", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617364" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1071" }, { "category": "external", "summary": "RHBZ#1617364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1071", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1072", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617365" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1072" }, { "category": "external", "summary": "RHBZ#1617365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2004_504
Vulnerability from csaf_redhat
Published
2004-12-13 20:17
Modified
2024-11-21 23:15
Summary
Red Hat Security Advisory: Updated Itanium kernel packages resolve security issues
Notes
Topic
Updated Itanium kernel packages are now available as part of ongoing
support and maintenance of Red Hat Enterprise Linux version 2.1. This is
the sixth regular update.
Details
The Linux kernel handles the basic functions of the operating system.
This is the sixth regular Itanium kernel update to Red Hat Enterprise Linux
version 2.1. This kernel updates several important drivers and fixes a
number of bugs.
This update includes fixes for several security issues:
Paul Starzetz of iSEC discovered various flaws in the ELF binary
loader affecting kernels prior to 2.4.28. A local user could use these
flaws to gain read access to executable-only binaries or possibly gain
privileges. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071,
CAN-2004-1072, and CAN-2004-1073 to these issues.
A missing serialization flaw in unix_dgram_recvmsg was discovered that
affects kernels prior to 2.4.28. A local user could potentially make
use of a race condition in order to gain privileges. (CAN-2004-1068)
SGI discovered a bug in the elf loader that affects kernels before
2.4.25 which could be triggered by a malformed binary. On
architectures other than x86, a local user could create a malicious
binary which could cause a denial of service (crash). (CAN-2004-0136)
Stefan Esser discovered various flaws including buffer overflows in
the smbfs driver affecting kernels before 2.4.28. A local user may be
able to cause a denial of service (crash) or possibly gain privileges.
In order to exploit these flaws the user would need to have control of
a connected smb server. (CAN-2004-0883, CAN-2004-0949)
A floating point information leak was discovered in the ia64 architecture
context switch code in kernels before 2.4.27. A local user could use this
flaw to read register values of other processes by setting the MFH bit.
(CAN-2004-0565)
Conectiva discovered flaws in certain USB drivers affecting kernels
before 2.4.27 which used the copy_to_user function on uninitialized
structures. These flaws could allow local users to read small amounts of
kernel memory. (CAN-2004-0685)
The ext3 and jfs code in kernels before 2.4.26 did not properly initialize
journal descriptor blocks. A privileged local user could read portions of
kernel memory. (CAN-2004-0177, CAN-2004-0181)
The following drivers have been updated:
* fusion to 2.05.16.16.02
* e1000 to 5.3.19-k2
* e100 to 3.0.27-k2
All Red Hat Enterprise Linux 2.1 users running Itanium are advised to
upgrade their kernels to the packages listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Itanium kernel packages are now available as part of ongoing\nsupport and maintenance of Red Hat Enterprise Linux version 2.1. This is\nthe sixth regular update.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the sixth regular Itanium kernel update to Red Hat Enterprise Linux\nversion 2.1. This kernel updates several important drivers and fixes a\nnumber of bugs.\n\nThis update includes fixes for several security issues:\n\nPaul Starzetz of iSEC discovered various flaws in the ELF binary\nloader affecting kernels prior to 2.4.28. A local user could use these\nflaws to gain read access to executable-only binaries or possibly gain\nprivileges. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071,\nCAN-2004-1072, and CAN-2004-1073 to these issues.\n\nA missing serialization flaw in unix_dgram_recvmsg was discovered that\naffects kernels prior to 2.4.28. A local user could potentially make\nuse of a race condition in order to gain privileges. (CAN-2004-1068)\n\nSGI discovered a bug in the elf loader that affects kernels before\n2.4.25 which could be triggered by a malformed binary. On\narchitectures other than x86, a local user could create a malicious\nbinary which could cause a denial of service (crash). (CAN-2004-0136)\n\nStefan Esser discovered various flaws including buffer overflows in\nthe smbfs driver affecting kernels before 2.4.28. A local user may be\nable to cause a denial of service (crash) or possibly gain privileges.\nIn order to exploit these flaws the user would need to have control of\na connected smb server. (CAN-2004-0883, CAN-2004-0949)\n\nA floating point information leak was discovered in the ia64 architecture\ncontext switch code in kernels before 2.4.27. A local user could use this\nflaw to read register values of other processes by setting the MFH bit.\n(CAN-2004-0565)\n\nConectiva discovered flaws in certain USB drivers affecting kernels\nbefore 2.4.27 which used the copy_to_user function on uninitialized\nstructures. These flaws could allow local users to read small amounts of\nkernel memory. (CAN-2004-0685)\n\nThe ext3 and jfs code in kernels before 2.4.26 did not properly initialize\njournal descriptor blocks. A privileged local user could read portions of\nkernel memory. (CAN-2004-0177, CAN-2004-0181)\n\nThe following drivers have been updated:\n\n* fusion to 2.05.16.16.02\n* e1000 to 5.3.19-k2\n* e100 to 3.0.27-k2\n\nAll Red Hat Enterprise Linux 2.1 users running Itanium are advised to\nupgrade their kernels to the packages listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:504", "url": "https://access.redhat.com/errata/RHSA-2004:504" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "121034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121034" }, { "category": "external", "summary": "121040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121040" }, { "category": "external", "summary": "124832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=124832" }, { "category": "external", "summary": "126127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126127" }, { "category": "external", "summary": "127385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127385" }, { "category": "external", "summary": "127916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127916" }, { "category": "external", "summary": "127920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127920" }, { "category": "external", "summary": "131493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131493" }, { "category": "external", "summary": "134722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134722" }, { "category": "external", "summary": "134802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134802" }, { "category": "external", "summary": "134876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134876" }, { "category": "external", "summary": "137446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137446" }, { "category": "external", "summary": "138443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138443" }, { "category": "external", "summary": "140712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=140712" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_504.json" } ], "title": "Red Hat Security Advisory: Updated Itanium kernel packages resolve security issues", "tracking": { "current_release_date": "2024-11-21T23:15:04+00:00", "generator": { "date": "2024-11-21T23:15:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:504", "initial_release_date": "2004-12-13T20:17:00+00:00", "revision_history": [ { "date": "2004-12-13T20:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-12-13T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:15:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0138", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617159" } ], "notes": [ { "category": "description", "text": "The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0138" }, { "category": "external", "summary": "RHBZ#1617159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617159" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0138", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0138" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0138", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0138" } ], "release_date": "2004-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0177", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617168" } ], "notes": [ { "category": "description", "text": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0177" }, { "category": "external", "summary": "RHBZ#1617168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0181", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617172" } ], "notes": [ { "category": "description", "text": "The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0181" }, { "category": "external", "summary": "RHBZ#1617172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0181", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0181" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0565", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617231" } ], "notes": [ { "category": "description", "text": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0565" }, { "category": "external", "summary": "RHBZ#1617231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617231" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0565", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565" } ], "release_date": "2004-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "title": "security flaw" }, { "cve": "CVE-2004-0685", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617249" } ], "notes": [ { "category": "description", "text": "Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0685" }, { "category": "external", "summary": "RHBZ#1617249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0685", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685" } ], "release_date": "2003-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "title": "security flaw" }, { "cve": "CVE-2004-0883", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617312" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0883" }, { "category": "external", "summary": "RHBZ#1617312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0883", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0949", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617329" } ], "notes": [ { "category": "description", "text": "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0949" }, { "category": "external", "summary": "RHBZ#1617329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0949", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0949" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1068", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617362" } ], "notes": [ { "category": "description", "text": "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1068" }, { "category": "external", "summary": "RHBZ#1617362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068" } ], "release_date": "2004-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1070", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617363" } ], "notes": [ { "category": "description", "text": "The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1070" }, { "category": "external", "summary": "RHBZ#1617363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1070", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1070" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1071", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617364" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1071" }, { "category": "external", "summary": "RHBZ#1617364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1071", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1072", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617365" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1072" }, { "category": "external", "summary": "RHBZ#1617365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
ghsa-qcgh-9mjq-vq4m
Vulnerability from github
Published
2022-04-29 02:57
Modified
2022-04-29 02:57
Details
The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.
{ "affected": [], "aliases": [ "CVE-2004-0177" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2004-06-01T04:00:00Z", "severity": "MODERATE" }, "details": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "id": "GHSA-qcgh-9mjq-vq4m", "modified": "2022-04-29T02:57:16Z", "published": "2022-04-29T02:57:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177" }, { "type": "WEB", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000846" }, { "type": "WEB", "url": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=108213675028441\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2004-166.html" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "type": "WEB", "url": "http://www.ciac.org/ciac/bulletins/o-121.shtml" }, { "type": "WEB", "url": "http://www.ciac.org/ciac/bulletins/o-126.shtml" }, { "type": "WEB", "url": "http://www.ciac.org/ciac/bulletins/o-127.shtml" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-479" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-480" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-481" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-482" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-489" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-491" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-495" }, { "type": "WEB", "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/10152" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2004-0177
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2004-0177", "description": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "id": "GSD-2004-0177", "references": [ "https://www.suse.com/security/cve/CVE-2004-0177.html", "https://www.debian.org/security/2004/dsa-495", "https://www.debian.org/security/2004/dsa-491", "https://www.debian.org/security/2004/dsa-489", "https://www.debian.org/security/2004/dsa-482", "https://www.debian.org/security/2004/dsa-481", "https://www.debian.org/security/2004/dsa-479", "https://www.debian.org/security/2004/dsa-480", "https://access.redhat.com/errata/RHSA-2005:293", "https://access.redhat.com/errata/RHSA-2004:505", "https://access.redhat.com/errata/RHSA-2004:504", "https://access.redhat.com/errata/RHSA-2004:166" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-0177" ], "details": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "id": "GSD-2004-0177", "modified": "2023-12-13T01:22:54.012230Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0177", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "O-127", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-127.shtml" }, { "name": "2004-0020", "refsource": "TRUSTIX", "url": "http://marc.info/?l=bugtraq\u0026m=108213675028441\u0026w=2" }, { "name": "FLSA:2336", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "DSA-482", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-482" }, { "name": "DSA-495", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "DSA-479", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-479" }, { "name": "linux-ext3-info-disclosure(15867)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867" }, { "name": "DSA-480", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-480" }, { "name": "10152", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10152" }, { "name": "CLA-2004:846", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000846" }, { "name": "DSA-489", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-489" }, { "name": "DSA-481", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-481" }, { "name": "oval:org.mitre.oval:def:10556", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556" }, { "name": "RHSA-2005:293", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "ESA-20040428-004", "refsource": "ENGARDE", "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" }, { "name": "RHSA-2004:505", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "O-121", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-121.shtml" }, { "name": "O-126", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/o-126.shtml" }, { "name": "RHSA-2004:504", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "MDKSA-2004:029", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029" }, { "name": "GLSA-200407-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "RHSA-2004:166", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2004-166.html" }, { "name": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ", "refsource": "MISC", "url": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ" }, { "name": "DSA-491", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-491" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0177" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2004:166", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2004-166.html" }, { "name": "ESA-20040428-004", "refsource": "ENGARDE", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html" }, { "name": "DSA-495", "refsource": "DEBIAN", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "DSA-479", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-479" }, { "name": "DSA-480", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-480" }, { "name": "DSA-481", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-481" }, { "name": "DSA-482", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-482" }, { "name": "DSA-489", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-489" }, { "name": "DSA-491", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-491" }, { "name": "FLSA:2336", "refsource": "FEDORA", "tags": [], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "GLSA-200407-02", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ", "refsource": "MISC", "tags": [], "url": "http://linux.bkbits.net:8080/linux-2.4/cset@4056b368s6vpJbGWxDD_LhQNYQrdzQ" }, { "name": "O-121", "refsource": "CIAC", "tags": [], "url": "http://www.ciac.org/ciac/bulletins/o-121.shtml" }, { "name": "O-126", "refsource": "CIAC", "tags": [], "url": "http://www.ciac.org/ciac/bulletins/o-126.shtml" }, { "name": "O-127", "refsource": "CIAC", "tags": [], "url": "http://www.ciac.org/ciac/bulletins/o-127.shtml" }, { "name": "10152", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/10152" }, { "name": "RHSA-2005:293", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "CLA-2004:846", "refsource": "CONECTIVA", "tags": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000846" }, { "name": "RHSA-2004:504", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "RHSA-2004:505", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "MDKSA-2004:029", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:029" }, { "name": "2004-0020", "refsource": "TRUSTIX", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=108213675028441\u0026w=2" }, { "name": "linux-ext3-info-disclosure(15867)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15867" }, { "name": "oval:org.mitre.oval:def:10556", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:29Z", "publishedDate": "2004-06-01T04:00Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.