Action not permitted
Modal body text goes here.
cve-2004-0554
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:24:26.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20163" }, { "name": "VU#973654", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/973654" }, { "name": "oval:org.mitre.oval:def:9426", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "RHSA-2004:255", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-255.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html" }, { "name": "10538", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/10538" }, { "name": "RHSA-2004:260", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-260.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905" }, { "name": "SuSE-SA:2004:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2004_17_kernel.html" }, { "name": "2004-0034", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.net/errata/2004/0034/" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "FEDORA-2004-186", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lwn.net/Articles/91155/" }, { "name": "20162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20162" }, { "name": "20040620 TSSA-2004-011 - kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108786114032681\u0026w=2" }, { "name": "ESA-20040621-005", "tags": [ "vendor-advisory", "x_refsource_ENGARDE", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=108793699910896\u0026w=2" }, { "name": "CLA-2004:845", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000845" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "linux-dos(16412)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16412" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "oval:org.mitre.oval:def:2915", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915" }, { "name": "MDKSA-2004:062", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:062" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20202" }, { "name": "GLSA-200407-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "[linux-kernel] 20040609 timer + fpu stuff locks my console race", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=108681568931323\u0026w=2" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20338" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-06-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20163" }, { "name": "VU#973654", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/973654" }, { "name": "oval:org.mitre.oval:def:9426", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "RHSA-2004:255", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-255.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html" }, { "name": "10538", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/10538" }, { "name": "RHSA-2004:260", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-260.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905" }, { "name": "SuSE-SA:2004:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2004_17_kernel.html" }, { "name": "2004-0034", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.net/errata/2004/0034/" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "FEDORA-2004-186", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lwn.net/Articles/91155/" }, { "name": "20162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20162" }, { "name": "20040620 TSSA-2004-011 - kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=108786114032681\u0026w=2" }, { "name": "ESA-20040621-005", "tags": [ "vendor-advisory", "x_refsource_ENGARDE" ], "url": "http://marc.info/?l=bugtraq\u0026m=108793699910896\u0026w=2" }, { "name": "CLA-2004:845", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000845" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "linux-dos(16412)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16412" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "oval:org.mitre.oval:def:2915", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915" }, { "name": "MDKSA-2004:062", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:062" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20202" }, { "name": "GLSA-200407-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "[linux-kernel] 20040609 timer + fpu stuff locks my console race", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=108681568931323\u0026w=2" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20338" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0554", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "VU#973654", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/973654" }, { "name": "oval:org.mitre.oval:def:9426", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "RHSA-2004:255", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-255.html" }, { "name": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html", "refsource": "MISC", "url": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html" }, { "name": "10538", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10538" }, { "name": "RHSA-2004:260", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-260.html" }, { "name": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905", "refsource": "MISC", "url": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905" }, { "name": "SuSE-SA:2004:017", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_17_kernel.html" }, { "name": "2004-0034", "refsource": "TRUSTIX", "url": "http://www.trustix.net/errata/2004/0034/" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "FEDORA-2004-186", "refsource": "FEDORA", "url": "http://lwn.net/Articles/91155/" }, { "name": "20162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20162" }, { "name": "20040620 TSSA-2004-011 - kernel", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108786114032681\u0026w=2" }, { "name": "ESA-20040621-005", "refsource": "ENGARDE", "url": "http://marc.info/?l=bugtraq\u0026m=108793699910896\u0026w=2" }, { "name": "CLA-2004:845", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000845" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "linux-dos(16412)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16412" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "oval:org.mitre.oval:def:2915", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915" }, { "name": "MDKSA-2004:062", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:062" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "GLSA-200407-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "[linux-kernel] 20040609 timer + fpu stuff locks my console race", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=108681568931323\u0026w=2" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0554", "datePublished": "2004-06-15T04:00:00", "dateReserved": "2004-06-14T00:00:00", "dateUpdated": "2024-08-08T00:24:26.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-0554\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2004-08-06T04:00:00.000\",\"lastModified\":\"2017-10-11T01:29:28.200\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \\\"crash.c\\\" program.\"},{\"lang\":\"es\",\"value\":\"El kernel de Linux 2.4.2x y 2.6.x para x86 permite a usuarios locales causar una denegaci\u00f3n de servicio (ca\u00edda del sistema), posiblemente mediante un bucle infinito que dispara un manejador de se\u00f1al con una cierta secuencia de instrucciones fsave y fstor, originalmente demostrado con el programa \\\"crash.c\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":2.1},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E586558A-ABC3-42EB-8B4D-DC92A0D695E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:avaya:modular_messaging_message_storage_server:s3400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFF29C7-E5AA-44EB-B1A9-602B3692D893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F677E992-8D37-438F-97DF-9D98B28F020C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A399D94B-D08D-4454-A07A-6634C9AE612F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9336ABDF-9928-49F6-BAA7-D6E9829F9B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040991B8-FB4B-480B-B53B-AA7A884F9F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59688C40-C92F-431E-ADD7-6782622862D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C14A949-E2B8-4100-8ED4-645CB996B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0934C49-5F88-4189-BD88-2F32C39C2F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B0A230-4054-4483-A3A7-9A5A286C7552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"2641EE56-6F9D-400B-B456-877F4DA79B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"E0B458EA-495E-40FA-9379-C03757F7B1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"1728AB5D-55A9-46B0-A412-6F7263CAEB5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*\",\"matchCriteriaId\":\"81B543F9-C209-46C2-B0AE-E14818A6992E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"EC79FF22-2664-4C40-B0B3-6D23B5F45162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"DB89C970-DE94-4E09-A90A-077DB83AD156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:7:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"F7840155-DCF0-4C34-815B-71F872D31A20\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"D2E2EF3C-1379-4CBE-8FF5-DACD47834651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CD54FE-D682-4063-B7C3-8B29B26B39AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*\",\"matchCriteriaId\":\"37F124FE-15F1-49D7-9E03-8E036CE1A20C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8C55338-3372-413F-82E3-E1B476D6F41A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0E2D3B-B50A-46C2-BA1E-3E014DE91954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"56EF103F-5668-4754-A83B-D3662D0CE815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFABFCE5-4F86-4AE8-9849-BC360AC72098\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*\",\"matchCriteriaId\":\"C1A3B951-A1F8-4291-82FA-AB7922D13ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A451599B-5F4F-4D7F-B5EF-3AE9F9B89D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_email_server:iii:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD74DAB4-A68E-4748-BC43-2285FC9804D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_admin-cd_for_firewall:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52E04F16-A0C7-4B0C-A70E-2CA683E0C33B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"941DFF67-E9F6-41F0-A5CB-90105733327D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"117BBA08-9C1B-4CAC-A418-B044D69C27D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_firewall_cd:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52F8C98F-E10C-4FE8-96E7-27426F369E78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FDDFB81-4DFE-416A-BCE1-ED96AC3E69B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:suse_office_server:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18BAE686-972A-4756-9E5D-CF2830700891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C0BD87-CE4B-49D2-89BE-EF282C43AD72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E6C4A8-59F4-43EE-8413-E95289037598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE76357A-27E6-4D85-9AA0-1BB658C41568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56C5FDB-24E2-479D-87CA-164CD28567D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D982AE39-BB57-49E7-B5FE-5EF1ADE2F019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD14661C-E3BE-44DF-BC8D-294322BF23EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4007B0D-9606-46BD-866A-7911BEA292BE\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000845\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lwn.net/Articles/91155/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108786114032681\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=108793699910896\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=108681568931323\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20162\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20163\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20202\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20338\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-200407-02.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1067\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1069\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1070\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1082\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/973654\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2004:062\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2004_17_kernel.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-255.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-260.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/10538\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.trustix.net/errata/2004/0034/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/16412\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426\",\"source\":\"cve@mitre.org\"}]}}" } }
gsd-2004-0554
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2004-0554", "description": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program.", "id": "GSD-2004-0554", "references": [ "https://www.suse.com/security/cve/CVE-2004-0554.html", "https://www.debian.org/security/2006/dsa-1082", "https://www.debian.org/security/2006/dsa-1070", "https://www.debian.org/security/2006/dsa-1067", "https://www.debian.org/security/2006/dsa-1069", "https://access.redhat.com/errata/RHSA-2004:260", "https://access.redhat.com/errata/RHSA-2004:255" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-0554" ], "details": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program.", "id": "GSD-2004-0554", "modified": "2023-12-13T01:22:54.599034Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0554", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "VU#973654", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/973654" }, { "name": "oval:org.mitre.oval:def:9426", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "RHSA-2004:255", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-255.html" }, { "name": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html", "refsource": "MISC", "url": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html" }, { "name": "10538", "refsource": "BID", "url": "http://www.securityfocus.com/bid/10538" }, { "name": "RHSA-2004:260", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-260.html" }, { "name": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905", "refsource": "MISC", "url": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905" }, { "name": "SuSE-SA:2004:017", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2004_17_kernel.html" }, { "name": "2004-0034", "refsource": "TRUSTIX", "url": "http://www.trustix.net/errata/2004/0034/" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "FEDORA-2004-186", "refsource": "FEDORA", "url": "http://lwn.net/Articles/91155/" }, { "name": "20162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20162" }, { "name": "20040620 TSSA-2004-011 - kernel", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=108786114032681\u0026w=2" }, { "name": "ESA-20040621-005", "refsource": "ENGARDE", "url": "http://marc.info/?l=bugtraq\u0026m=108793699910896\u0026w=2" }, { "name": "CLA-2004:845", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000845" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "linux-dos(16412)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16412" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "oval:org.mitre.oval:def:2915", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915" }, { "name": "MDKSA-2004:062", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:062" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "GLSA-200407-02", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "[linux-kernel] 20040609 timer + fpu stuff locks my console race", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=108681568931323\u0026w=2" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:7:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:s3400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_firewall_cd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_email_server:iii:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_admin-cd_for_firewall:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_office_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0554" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "VU#973654", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/973654" }, { "name": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905", "refsource": "MISC", "tags": [], "url": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905" }, { "name": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html", "refsource": "MISC", "tags": [], "url": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html" }, { "name": "CLA-2004:845", "refsource": "CONECTIVA", "tags": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000845" }, { "name": "FEDORA-2004-186", "refsource": "FEDORA", "tags": [], "url": "http://lwn.net/Articles/91155/" }, { "name": "GLSA-200407-02", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "name": "RHSA-2004:255", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-255.html" }, { "name": "RHSA-2004:260", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-260.html" }, { "name": "SuSE-SA:2004:017", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2004_17_kernel.html" }, { "name": "2004-0034", "refsource": "TRUSTIX", "tags": [], "url": "http://www.trustix.net/errata/2004/0034/" }, { "name": "DSA-1070", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "DSA-1067", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "20162", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20162" }, { "name": "20163", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20163" }, { "name": "20202", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20202" }, { "name": "DSA-1082", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "20338", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20338" }, { "name": "MDKSA-2004:062", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:062" }, { "name": "10538", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/10538" }, { "name": "[linux-kernel] 20040609 timer + fpu stuff locks my console race", "refsource": "MLIST", "tags": [], "url": "http://marc.info/?l=linux-kernel\u0026m=108681568931323\u0026w=2" }, { "name": "20040620 TSSA-2004-011 - kernel", "refsource": "BUGTRAQ", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=108786114032681\u0026w=2" }, { "name": "ESA-20040621-005", "refsource": "ENGARDE", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=108793699910896\u0026w=2" }, { "name": "linux-dos(16412)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16412" }, { "name": "oval:org.mitre.oval:def:9426", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426" }, { "name": "oval:org.mitre.oval:def:2915", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:29Z", "publishedDate": "2004-08-06T04:00Z" } } }
rhsa-2004_260
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages for Red Hat Enterprise Linux 2.1 that fix security\nvulnerabilities are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA flaw was found in Linux kernel versions 2.4 and 2.6 for x86 and x86_64\nthat allowed local users to cause a denial of service (system crash) by\ntriggering a signal handler with a certain sequence of fsave and frstor\ninstructions. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-0554 to this issue.\n\nEnhancements were committed to the 2.6 kernel by Al Viro which enabled the\nSparse source code checking tool to check for a certain class of kernel\nbugs. A subset of these fixes also applies to various drivers in the 2.4\nkernel. These flaws could lead to privilege escalation or access to kernel\nmemory. The Common Vulnerabilities and Exposures project (cve.mitre.org)\nhas assigned the name CAN-2004-0495 to these issues.\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum. These packages contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:260", "url": "https://access.redhat.com/errata/RHSA-2004:260" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "126031", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126031" }, { "category": "external", "summary": "126122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126122" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_260.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:06:47+00:00", "generator": { "date": "2024-11-21T23:06:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:260", "initial_release_date": "2004-06-18T21:22:00+00:00", "revision_history": [ { "date": "2004-06-18T21:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-06-18T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:06:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0495", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617213" } ], "notes": [ { "category": "description", "text": "Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0495" }, { "category": "external", "summary": "RHBZ#1617213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617213" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0495", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0495" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0495", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0495" } ], "release_date": "2004-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-06-18T21:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:260" } ], "title": "security flaw" }, { "cve": "CVE-2004-0554", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617228" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0554" }, { "category": "external", "summary": "RHBZ#1617228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617228" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0554", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0554" } ], "release_date": "2004-06-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-06-18T21:22:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:260" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2004_255
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages for Red Hat Enterprise Linux 3 that fix security\nvulnerabilities are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA flaw was found in Linux kernel versions 2.4 and 2.6 for x86 and x86_64\nthat allowed local users to cause a denial of service (system crash) by\ntriggering a signal handler with a certain sequence of fsave and frstor\ninstructions. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-0554 to this issue.\n\nAnother flaw was discovered in an error path supporting the clone()\nsystem call that allowed local users to cause a denial of service\n(memory leak) by passing invalid arguments to clone() running in an\ninfinite loop of a user\u0027s program. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-0427\nto this issue.\n\nEnhancements were committed to the 2.6 kernel by Al Viro which enabled the\nSparse source code checking tool to check for a certain class of kernel\nbugs. A subset of these fixes also applies to various drivers in the 2.4\nkernel. Although the majority of these resides in drivers unsupported in\nRed Hat Enterprise Linux 3, the flaws could lead to privilege escalation or\naccess to kernel memory. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-0495 to these issues.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum. These packages contain\nbackported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:255", "url": "https://access.redhat.com/errata/RHSA-2004:255" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "125794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=125794" }, { "category": "external", "summary": "125901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=125901" }, { "category": "external", "summary": "125968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=125968" }, { "category": "external", "summary": "126121", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126121" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_255.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:06:43+00:00", "generator": { "date": "2024-11-21T23:06:43+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2004:255", "initial_release_date": "2004-06-18T01:00:00+00:00", "revision_history": [ { "date": "2004-06-18T01:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-06-17T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:06:43+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-15.0.2.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.i686", "product_id": "kernel-smp-0:2.4.21-15.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-15.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-15.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.i686", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.i686", "product_id": "kernel-0:2.4.21-15.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-15.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-15.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-15.0.2.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-15.0.2.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.athlon", "product_id": "kernel-smp-0:2.4.21-15.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-15.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-15.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.athlon", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.athlon", "product_id": "kernel-0:2.4.21-15.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-15.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-15.0.2.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.i386", "product_id": "kernel-doc-0:2.4.21-15.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-15.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-15.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-15.0.2.EL.i386", "product": { "name": "kernel-source-0:2.4.21-15.0.2.EL.i386", "product_id": "kernel-source-0:2.4.21-15.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-15.0.2.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-15.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-15.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-15.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.x86_64", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.x86_64", "product_id": "kernel-0:2.4.21-15.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-15.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-15.0.2.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-15.0.2.EL.x86_64", "product_id": "kernel-source-0:2.4.21-15.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-15.0.2.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-15.0.2.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.ia32e", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.ia32e", "product_id": "kernel-0:2.4.21-15.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-15.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-15.0.2.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ia64", "product_id": "kernel-doc-0:2.4.21-15.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-15.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.ia64", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.ia64", "product_id": "kernel-0:2.4.21-15.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-15.0.2.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ia64", "product_id": "kernel-source-0:2.4.21-15.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-15.0.2.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.src", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.src", "product_id": "kernel-0:2.4.21-15.0.2.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-15.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390x", "product_id": "kernel-doc-0:2.4.21-15.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-15.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.s390x", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.s390x", "product_id": "kernel-0:2.4.21-15.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-15.0.2.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390x", "product_id": "kernel-source-0:2.4.21-15.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-15.0.2.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-15.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390", "product_id": "kernel-doc-0:2.4.21-15.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-15.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.s390", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.s390", "product_id": "kernel-0:2.4.21-15.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-15.0.2.EL.s390", "product": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390", "product_id": "kernel-source-0:2.4.21-15.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-15.0.2.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-15.0.2.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-15.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-15.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-15.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-15.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-15.0.2.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ppc64", "product_id": "kernel-source-0:2.4.21-15.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-15.0.2.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-15.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-15.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0427", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617207" } ], "notes": [ { "category": "description", "text": "The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-0:2.4.21-15.0.2.EL.src", "3AS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-15.0.2.EL.src", "3Desktop:kernel-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-0:2.4.21-15.0.2.EL.src", "3ES:kernel-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-0:2.4.21-15.0.2.EL.src", "3WS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0427" }, { "category": "external", "summary": "RHBZ#1617207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0427", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0427" } ], "release_date": "2004-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-06-18T01:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "3AS:kernel-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-0:2.4.21-15.0.2.EL.src", "3AS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-15.0.2.EL.src", "3Desktop:kernel-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-0:2.4.21-15.0.2.EL.src", "3ES:kernel-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-0:2.4.21-15.0.2.EL.src", "3WS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:255" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0495", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617213" } ], "notes": [ { "category": "description", "text": "Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-0:2.4.21-15.0.2.EL.src", "3AS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-15.0.2.EL.src", "3Desktop:kernel-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-0:2.4.21-15.0.2.EL.src", "3ES:kernel-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-0:2.4.21-15.0.2.EL.src", "3WS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0495" }, { "category": "external", "summary": "RHBZ#1617213", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617213" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0495", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0495" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0495", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0495" } ], "release_date": "2004-06-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-06-18T01:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "3AS:kernel-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-0:2.4.21-15.0.2.EL.src", "3AS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-15.0.2.EL.src", "3Desktop:kernel-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-0:2.4.21-15.0.2.EL.src", "3ES:kernel-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-0:2.4.21-15.0.2.EL.src", "3WS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:255" } ], "title": "security flaw" }, { "cve": "CVE-2004-0554", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617228" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-0:2.4.21-15.0.2.EL.src", "3AS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-15.0.2.EL.src", "3Desktop:kernel-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-0:2.4.21-15.0.2.EL.src", "3ES:kernel-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-0:2.4.21-15.0.2.EL.src", "3WS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0554" }, { "category": "external", "summary": "RHBZ#1617228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617228" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0554", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0554" } ], "release_date": "2004-06-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-06-18T01:00:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "3AS:kernel-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-0:2.4.21-15.0.2.EL.src", "3AS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-15.0.2.EL.src", "3Desktop:kernel-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-0:2.4.21-15.0.2.EL.src", "3ES:kernel-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-0:2.4.21-15.0.2.EL.src", "3WS:kernel-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-15.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-15.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:255" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
var-200406-0158
Vulnerability from variot
Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program. The Linux kernel contains a denial-of-service vulnerability that allows local users to disable affected hosts. Linux Kernel Stores the process state of the floating point unit / Used to restore FSAVE/FRSTOR There are deficiencies in the handling of instructions. This issue is due to a design error that causes the kernel to fail to properly handle floating-point exceptions. This issue may be leveraged by an attacker to cause the affected system to crash, denying service to legitimate users. Although only select Linux kernels are reported to be affected, it is likely that various other versions are vulnerable as well. These issues were found during a recent audit of the Linux kernel source. The following drivers are reportedly affected by these issues: aironet asus_acpi decnet mpu401 msnd pss These issues may reportedly allow attackers to access kernel memory or gain escalated privileges on the affected computer. Local attackers can exploit these vulnerabilities to elevate privileges or conduct denial-of-service attacks on the system. The affected device drivers are: aironet, asus_acpi, decnet, mpu401, msnd, and pss. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA 1069-1 security@debian.org http://www.debian.org/security/ Martin Schulze, Dann Frazier May 20th, 2006 http://www.debian.org/security/faq
Package : kernel-source-2.4.18,kernel-image-2.4.18-1-alpha,kernel-image-2.4.18-1-i386,kernel-image-2.4.18-hppa,kernel-image-2.4.18-powerpc-xfs,kernel-patch-2.4.18-powerpc,kernel-patch-benh Vulnerability : several Problem-Type : local/remote Debian-specific: no CVE IDs : CVE-2004-0427 CVE-2005-0489 CVE-2004-0394 CVE-2004-0447 CVE-2004-0554 CVE-2004-0565 CVE-2004-0685 CVE-2005-0001 CVE-2004-0883 CVE-2004-0949 CVE-2004-1016 CVE-2004-1333 CVE-2004-0997 CVE-2004-1335 CVE-2004-1017 CVE-2005-0124 CVE-2005-0528 CVE-2003-0984 CVE-2004-1070 CVE-2004-1071 CVE-2004-1072 CVE-2004-1073 CVE-2004-1074 CVE-2004-0138 CVE-2004-1068 CVE-2004-1234 CVE-2005-0003 CVE-2004-1235 CVE-2005-0504 CVE-2005-0384 CVE-2005-0135
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.
CVE-2004-0394
A buffer overflow in the panic handling code has been found.
CVE-2004-0565
An information leak in the context switch code has been found on
the IA64 architecture.
CVE-2004-0685
Unsafe use of copy_to_user in USB drivers may disclose sensitive
information.
CVE-2005-0001
A race condition in the i386 page fault handler may allow privilege
escalation.
CVE-2004-0883
Multiple vulnerabilities in the SMB filesystem code may allow denial
of service of information disclosure.
CVE-2004-0949
An information leak discovered in the SMB filesystem code.
CVE-2004-0997
A local privilege escalation in the MIPS assembly code has been found.
CVE-2004-1335
A memory leak in the ip_options_get() function may lead to denial of
service.
CVE-2004-1017
Multiple overflows exist in the io_edgeport driver which might be usable
as a denial of service attack vector.
CVE-2005-0124
Bryan Fulton reported a bounds checking bug in the coda_pioctl function
which may allow local users to execute arbitrary code or trigger a denial
of service attack.
CVE-2005-0528
A local privilege escalation in the mremap function has been found
CVE-2003-0984
Inproper initialization of the RTC may disclose information.
CVE-2004-1070
Insufficient input sanitising in the load_elf_binary() function may
lead to privilege escalation.
CVE-2004-1071
Incorrect error handling in the binfmt_elf loader may lead to privilege
escalation.
CVE-2004-1072
A buffer overflow in the binfmt_elf loader may lead to privilege
escalation or denial of service.
CVE-2004-1073
The open_exec function may disclose information.
CVE-2004-1074
The binfmt code is vulnerable to denial of service through malformed
a.out binaries.
CVE-2004-1068
A programming error in the unix_dgram_recvmsg() function may lead to
privilege escalation.
CVE-2004-1234
The ELF loader is vulnerable to denial of service through malformed
binaries.
CVE-2005-0003
Crafted ELF binaries may lead to privilege escalation, due to
insufficient checking of overlapping memory regions.
CVE-2004-1235
A race condition in the load_elf_library() and binfmt_aout() functions
may allow privilege escalation.
CVE-2005-0504
An integer overflow in the Moxa driver may lead to privilege escalation.
The following matrix explains which kernel version for which architecture fix the problems mentioned above:
Debian 3.0 (woody)
Source 2.4.18-14.4
Alpha architecture 2.4.18-15woody1
Intel IA-32 architecture 2.4.18-13.2
HP Precision architecture 62.4
PowerPC architecture 2.4.18-1woody6
PowerPC architecture/XFS 20020329woody1
PowerPC architecture/benh 20020304woody1
Sun Sparc architecture 22woody1
We recommend that you upgrade your kernel package immediately and reboot the machine.
Upgrade Instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get dist-upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show
iD8DBQFEb9YGXm3vHE4uyloRAkhXAJ0e1RmUxVZSbQICFa/j07oKPfWRVwCeMrhj wYGegwosZg6xi3oI77opLQY= =eu/T -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ .
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc
Size/MD5 checksum: 692 27f44a0eec5837b0b01d26c6cff392be
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz
Size/MD5 checksum: 27768 6c719a6343c9ea0dad44a736b3842504
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc
Size/MD5 checksum: 792 d7c89c90fad77944ca1c5a18327f31dd
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz
Size/MD5 checksum: 1013866 21b4b677a7a319442c8fe8a4c72eb4c2
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc
Size/MD5 checksum: 672 4c353db091e8edc4395e46cf8d39ec42
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz
Size/MD5 checksum: 71071 7012adde9ba9a573e1be66f0d258721a
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz
Size/MD5 checksum: 32000211 237896fbb45ae652cc9c5cecc9b746da
Architecture independent components:
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb
Size/MD5 checksum: 1521850 75d23c7c54094b1d25d3b708fd644407
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb
Size/MD5 checksum: 1547874 c6881b25e3a5967e0f6f9c351fb88962
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb
Size/MD5 checksum: 1014564 0e89364c2816f5f4519256a8ea367ab6
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb
Size/MD5 checksum: 1785490 c66cef9e87d9a89caeee02af31e3c96d
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb
Size/MD5 checksum: 25902158 321403201a198371fd55c9b8ac4583f7
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb
Size/MD5 checksum: 3923058 db7bbd997410667bec4ac713d81d60ea
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb
Size/MD5 checksum: 4044796 106fcb86485531d96b4fdada61b71405
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb
Size/MD5 checksum: 3831424 347b0c290989f0cc99f3b336c156f61d
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb
Size/MD5 checksum: 3952220 f7dd8326c0ae0b0dee7c46e24023d0a2
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb
Size/MD5 checksum: 3890804 7348a8cd3961190aa2a19f562c96fe2f
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb
Size/MD5 checksum: 2080618 d52d00e7097ae0c8f4ccb6f34656361d
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb
Size/MD5 checksum: 2080830 db7141d3c0d86a43659176f974599cc2
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb
Size/MD5 checksum: 15816 c31e3b72d6eac6f3f99f75ea838e0bf9
These files will probably be moved into the stable distribution on its next update
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200406-0158", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 2.2, "vendor": "suse", "version": "8.1" }, { "model": "linux", "scope": "eq", "trust": 2.2, "vendor": "suse", "version": "8.0" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.6.5" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.6.4" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.6.3" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.6.2" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.4.26" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.4.25" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.4.22" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel", "scope": "eq", "trust": 1.6, "vendor": "linux", "version": "2.4.18" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "gentoo", "version": "1.4" }, { "model": "converged communications server", "scope": "eq", "trust": 1.6, "vendor": "avaya", "version": "2.0" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "suse", "version": "8" }, { "model": "linux", "scope": "eq", "trust": 1.6, "vendor": "suse", "version": "7" }, { "model": "linux", "scope": "eq", "trust": 1.3, "vendor": "suse", "version": "9.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.6.7" }, { "model": "email server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "3.1" }, { "model": "linux firewall cd", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "*" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "s8500", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "conectiva", "version": "9.0" }, { "model": "modular messaging message storage server", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "s3400" }, { "model": "s8700", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "linux connectivity server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "*" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "conectiva", "version": "8.0" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.6.0" }, { "model": "linux admin-cd for firewall", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "*" }, { "model": "s8300", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "8.2" }, { "model": "office server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "*" }, { "model": "s8500", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "linux database server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "*" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.1" }, { "model": "s8700", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "linux office server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "*" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "9.0" }, { "model": "email server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "iii" }, { "model": "s8300", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "conectiva", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "guardian digital", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mandrakesoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "slackware", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trustix secure linux", "version": null }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "2.1" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "7" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "8" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "linux office server", "scope": null, "trust": 0.6, "vendor": "s u s e", "version": null }, { "model": "linux firewall on cd", "scope": null, "trust": 0.6, "vendor": "s u s e", "version": null }, { "model": "linux database server", "scope": "eq", "trust": 0.6, "vendor": "s u s e", "version": "0" }, { "model": "linux connectivity server", "scope": null, "trust": 0.6, "vendor": "s u s e", "version": null }, { "model": "linux admin-cd for firewall", "scope": null, "trust": 0.6, "vendor": "s u s e", "version": null }, { "model": "kernel rc1", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.6, "vendor": "linux", "version": "2.6" }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.6, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.6, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.6, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.6, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.6, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.6, "vendor": "avaya", "version": null }, { "model": "s3400 message application server", "scope": "eq", "trust": 0.6, "vendor": "avaya", "version": "0" }, { "model": "intuity lx", "scope": null, "trust": 0.6, "vendor": "avaya", "version": null }, { "model": "enterprise server -u1", "scope": "eq", "trust": 0.3, "vendor": "tinysofa", "version": "1.0" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "tinysofa", "version": "1.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "linux mandrake ppc", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.1" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.20" }, { "model": "secure professional", "scope": "eq", "trust": 0.3, "vendor": "engarde", "version": "1.5" }, { "model": "secure community", "scope": "eq", "trust": 0.3, "vendor": "engarde", "version": "2.0" }, { "model": "enterprise server -u2", "scope": "ne", "trust": 0.3, "vendor": "tinysofa", "version": "1.0" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "ne", "trust": 0.3, "vendor": "linux", "version": "2.2.19" }, { "model": "linux kernel pre6-gentoo", "scope": "ne", "trust": 0.3, "vendor": "gentoo", "version": "2.4.26" }, { "model": "linux kernel -rc3-gentoo", "scope": "ne", "trust": 0.3, "vendor": "gentoo", "version": "2.4.26" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.1" }, { "model": "secure linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "secure enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "trustix", "version": "2.0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "7" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "8.0" }, { "model": "suse email server iii", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "suse email server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "3.1" }, { "model": "office server", "scope": null, "trust": 0.3, "vendor": "s u s e", "version": null }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.1" }, { "model": "linux personal x86 64", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9.0" }, { "model": "linux personal", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "8.2" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" } ], "sources": [ { "db": "CERT/CC", "id": "VU#973654" }, { "db": "BID", "id": "10538" }, { "db": "BID", "id": "10566" }, { "db": "JVNDB", "id": "JVNDB-2004-000225" }, { "db": "CNNVD", "id": "CNNVD-200408-053" }, { "db": "NVD", "id": "CVE-2004-0554" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:7:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:s3400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_firewall_cd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_email_server:iii:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_admin-cd_for_firewall:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_office_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0554" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alexander Viro", "sources": [ { "db": "CNNVD", "id": "CNNVD-200408-053" } ], "trust": 0.6 }, "cve": "CVE-2004-0554", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2004-0554", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-8984", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2004-0554", "trust": 1.8, "value": "LOW" }, { "author": "CARNEGIE MELLON", "id": "VU#973654", "trust": 0.8, "value": "11.81" }, { "author": "CNNVD", "id": "CNNVD-200408-053", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-8984", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#973654" }, { "db": "VULHUB", "id": "VHN-8984" }, { "db": "JVNDB", "id": "JVNDB-2004-000225" }, { "db": "CNNVD", "id": "CNNVD-200408-053" }, { "db": "NVD", "id": "CVE-2004-0554" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program. The Linux kernel contains a denial-of-service vulnerability that allows local users to disable affected hosts. Linux Kernel Stores the process state of the floating point unit / Used to restore FSAVE/FRSTOR There are deficiencies in the handling of instructions. This issue is due to a design error that causes the kernel to fail to properly handle floating-point exceptions. \nThis issue may be leveraged by an attacker to cause the affected system to crash, denying service to legitimate users. \nAlthough only select Linux kernels are reported to be affected, it is likely that various other versions are vulnerable as well. These issues were found during a recent audit of the Linux kernel source. \nThe following drivers are reportedly affected by these issues:\naironet\nasus_acpi\ndecnet\nmpu401\nmsnd\npss\nThese issues may reportedly allow attackers to access kernel memory or gain escalated privileges on the affected computer. Local attackers can exploit these vulnerabilities to elevate privileges or conduct denial-of-service attacks on the system. The affected device drivers are: aironet, asus_acpi, decnet, mpu401, msnd, and pss. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- --------------------------------------------------------------------------\nDebian Security Advisory DSA 1069-1 security@debian.org\nhttp://www.debian.org/security/ Martin Schulze, Dann Frazier\nMay 20th, 2006 http://www.debian.org/security/faq\n- --------------------------------------------------------------------------\n\nPackage : kernel-source-2.4.18,kernel-image-2.4.18-1-alpha,kernel-image-2.4.18-1-i386,kernel-image-2.4.18-hppa,kernel-image-2.4.18-powerpc-xfs,kernel-patch-2.4.18-powerpc,kernel-patch-benh\nVulnerability : several\nProblem-Type : local/remote\nDebian-specific: no\nCVE IDs : CVE-2004-0427 CVE-2005-0489 CVE-2004-0394 CVE-2004-0447 CVE-2004-0554 CVE-2004-0565 CVE-2004-0685 CVE-2005-0001 CVE-2004-0883 CVE-2004-0949 CVE-2004-1016 CVE-2004-1333 CVE-2004-0997 CVE-2004-1335 CVE-2004-1017 CVE-2005-0124 CVE-2005-0528 CVE-2003-0984 CVE-2004-1070 CVE-2004-1071 CVE-2004-1072 CVE-2004-1073 CVE-2004-1074 CVE-2004-0138 CVE-2004-1068 CVE-2004-1234 CVE-2005-0003 CVE-2004-1235 CVE-2005-0504 CVE-2005-0384 CVE-2005-0135\n\nSeveral local and remote vulnerabilities have been discovered in the Linux\nkernel that may lead to a denial of service or the execution of arbitrary\ncode. \n\n CVE-2004-0394\n\n A buffer overflow in the panic handling code has been found. \n\n CVE-2004-0565\n\n An information leak in the context switch code has been found on\n the IA64 architecture. \n\n CVE-2004-0685\n\n Unsafe use of copy_to_user in USB drivers may disclose sensitive\n information. \n\n CVE-2005-0001\n\n A race condition in the i386 page fault handler may allow privilege\n escalation. \n\n CVE-2004-0883\n\n Multiple vulnerabilities in the SMB filesystem code may allow denial\n of service of information disclosure. \n\n CVE-2004-0949\n\n An information leak discovered in the SMB filesystem code. \n\n CVE-2004-0997\n\n A local privilege escalation in the MIPS assembly code has been found. \n \n CVE-2004-1335\n \n A memory leak in the ip_options_get() function may lead to denial of\n service. \n \n CVE-2004-1017\n\n Multiple overflows exist in the io_edgeport driver which might be usable\n as a denial of service attack vector. \n \n CVE-2005-0124\n\n Bryan Fulton reported a bounds checking bug in the coda_pioctl function\n which may allow local users to execute arbitrary code or trigger a denial\n of service attack. \n\n CVE-2005-0528\n\n A local privilege escalation in the mremap function has been found\n\n CVE-2003-0984\n\n Inproper initialization of the RTC may disclose information. \n\n CVE-2004-1070\n\n Insufficient input sanitising in the load_elf_binary() function may\n lead to privilege escalation. \n\n CVE-2004-1071\n\n Incorrect error handling in the binfmt_elf loader may lead to privilege\n escalation. \n\n CVE-2004-1072\n\n A buffer overflow in the binfmt_elf loader may lead to privilege\n escalation or denial of service. \n\n CVE-2004-1073\n\n The open_exec function may disclose information. \n\n CVE-2004-1074\n\n The binfmt code is vulnerable to denial of service through malformed\n a.out binaries. \n\n CVE-2004-1068\n\n A programming error in the unix_dgram_recvmsg() function may lead to\n privilege escalation. \n\n CVE-2004-1234\n\n The ELF loader is vulnerable to denial of service through malformed\n binaries. \n\n CVE-2005-0003\n\n Crafted ELF binaries may lead to privilege escalation, due to \n insufficient checking of overlapping memory regions. \n\n CVE-2004-1235\n\n A race condition in the load_elf_library() and binfmt_aout() functions\n may allow privilege escalation. \n\n CVE-2005-0504\n\n An integer overflow in the Moxa driver may lead to privilege escalation. \n\nThe following matrix explains which kernel version for which architecture\nfix the problems mentioned above:\n\n Debian 3.0 (woody)\n Source 2.4.18-14.4\n Alpha architecture 2.4.18-15woody1\n Intel IA-32 architecture 2.4.18-13.2\n HP Precision architecture 62.4 \n PowerPC architecture 2.4.18-1woody6\n PowerPC architecture/XFS 20020329woody1 \n PowerPC architecture/benh 20020304woody1\n Sun Sparc architecture 22woody1 \n\nWe recommend that you upgrade your kernel package immediately and reboot\nthe machine. \n\nUpgrade Instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get dist-upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 3.0 alias woody\n- --------------------------------\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.3 (GNU/Linux)\n\niD8DBQFEb9YGXm3vHE4uyloRAkhXAJ0e1RmUxVZSbQICFa/j07oKPfWRVwCeMrhj\nwYGegwosZg6xi3oI77opLQY=\n=eu/T\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. \n\n\nDebian GNU/Linux 3.0 alias woody\n- --------------------------------\n\n Source archives:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc\n Size/MD5 checksum: 692 27f44a0eec5837b0b01d26c6cff392be\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz\n Size/MD5 checksum: 27768 6c719a6343c9ea0dad44a736b3842504\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc\n Size/MD5 checksum: 792 d7c89c90fad77944ca1c5a18327f31dd\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz\n Size/MD5 checksum: 1013866 21b4b677a7a319442c8fe8a4c72eb4c2\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc\n Size/MD5 checksum: 672 4c353db091e8edc4395e46cf8d39ec42\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz\n Size/MD5 checksum: 71071 7012adde9ba9a573e1be66f0d258721a\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz\n Size/MD5 checksum: 32000211 237896fbb45ae652cc9c5cecc9b746da\n\n Architecture independent components:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb\n Size/MD5 checksum: 1521850 75d23c7c54094b1d25d3b708fd644407\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb\n Size/MD5 checksum: 1547874 c6881b25e3a5967e0f6f9c351fb88962\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb\n Size/MD5 checksum: 1014564 0e89364c2816f5f4519256a8ea367ab6\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb\n Size/MD5 checksum: 1785490 c66cef9e87d9a89caeee02af31e3c96d\n http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb\n Size/MD5 checksum: 25902158 321403201a198371fd55c9b8ac4583f7\n\n Sun Sparc architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb\n Size/MD5 checksum: 3923058 db7bbd997410667bec4ac713d81d60ea\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb\n Size/MD5 checksum: 4044796 106fcb86485531d96b4fdada61b71405\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb\n Size/MD5 checksum: 3831424 347b0c290989f0cc99f3b336c156f61d\n http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb\n Size/MD5 checksum: 3952220 f7dd8326c0ae0b0dee7c46e24023d0a2\n\n Big endian MIPS architecture:\n\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb\n Size/MD5 checksum: 3890804 7348a8cd3961190aa2a19f562c96fe2f\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb\n Size/MD5 checksum: 2080618 d52d00e7097ae0c8f4ccb6f34656361d\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb\n Size/MD5 checksum: 2080830 db7141d3c0d86a43659176f974599cc2\n http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb\n Size/MD5 checksum: 15816 c31e3b72d6eac6f3f99f75ea838e0bf9\n\n These files will probably be moved into the stable distribution on\n its next update", "sources": [ { "db": "NVD", "id": "CVE-2004-0554" }, { "db": "CERT/CC", "id": "VU#973654" }, { "db": "JVNDB", "id": "JVNDB-2004-000225" }, { "db": "BID", "id": "10538" }, { "db": "BID", "id": "10566" }, { "db": "VULHUB", "id": "VHN-8984" }, { "db": "PACKETSTORM", "id": "46506" }, { "db": "PACKETSTORM", "id": "46508" }, { "db": "PACKETSTORM", "id": "46509" } ], "trust": 3.24 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-8984", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-8984" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0554", "trust": 3.4 }, { "db": "CERT/CC", "id": "VU#973654", "trust": 3.3 }, { "db": "BID", "id": "10538", "trust": 2.8 }, { "db": "SECUNIA", "id": "20202", "trust": 1.7 }, { "db": "SECUNIA", "id": "20338", "trust": 1.7 }, { "db": "SECUNIA", "id": "20162", "trust": 1.7 }, { "db": "SECUNIA", "id": "20163", "trust": 1.7 }, { "db": "SECUNIA", "id": "11861", "trust": 1.6 }, { "db": "XF", "id": "16412", "trust": 1.4 }, { "db": "JVNDB", "id": "JVNDB-2004-000225", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200408-053", "trust": 0.7 }, { "db": "DEBIAN", "id": "DSA-1069", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1070", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1082", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1067", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2004:255", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2004:260", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2004:062", "trust": 0.6 }, { "db": "CONECTIVA", "id": "CLA-2004:845", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20040620 TSSA-2004-011 - KERNEL", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:9426", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:2915", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2004:017", "trust": 0.6 }, { "db": "TRUSTIX", "id": "2004-0034", "trust": 0.6 }, { "db": "FEDORA", "id": "FEDORA-2004-186", "trust": 0.6 }, { "db": "GENTOO", "id": "GLSA-200407-02", "trust": 0.6 }, { "db": "ENGARDE", "id": "ESA-20040621-005", "trust": 0.6 }, { "db": "MLIST", "id": "[LINUX-KERNEL] 20040609 TIMER + FPU STUFF LOCKS MY CONSOLE RACE", "trust": 0.6 }, { "db": "BID", "id": "10566", "trust": 0.3 }, { "db": "EXPLOIT-DB", "id": "306", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-8984", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46506", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46508", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46509", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#973654" }, { "db": "VULHUB", "id": "VHN-8984" }, { "db": "BID", "id": "10538" }, { "db": "BID", "id": "10566" }, { "db": "JVNDB", "id": "JVNDB-2004-000225" }, { "db": "PACKETSTORM", "id": "46506" }, { "db": "PACKETSTORM", "id": "46508" }, { "db": "PACKETSTORM", "id": "46509" }, { "db": "CNNVD", "id": "CNNVD-200408-053" }, { "db": "NVD", "id": "CVE-2004-0554" } ] }, "id": "VAR-200406-0158", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-8984" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T19:28:41.684000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "kernel_30", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/kernel_30.html" }, { "title": "kernel_se20", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/kernel_se20.html" }, { "title": "RHSA-2004:260", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2004-260.html" }, { "title": "RHSA-2004:255", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2004-255.html" }, { "title": "TLSA-2004-18", "trust": 0.8, "url": "http://www.turbolinux.com/security/2004/tlsa-2004-18.txt" }, { "title": "RHSA-2004:260", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2004-260j.html" }, { "title": "RHSA-2004:255", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2004-255j.html" }, { "title": "TLSA-2004-18", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2004/tlsa-2004-18j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2004-000225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0554" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.8, "url": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html" }, { "trust": 2.5, "url": "http://www.securityfocus.com/bid/10538" }, { "trust": 2.5, "url": "http://www.kb.cert.org/vuls/id/973654" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1067" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1069" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1070" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1082" }, { "trust": 1.7, "url": "http://lwn.net/articles/91155/" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2004:062" }, { "trust": 1.7, "url": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2004-255.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2004-260.html" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20162" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20163" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20202" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20338" }, { "trust": 1.7, "url": "http://www.novell.com/linux/security/advisories/2004_17_kernel.html" }, { "trust": 1.7, "url": "http://www.trustix.net/errata/2004/0034/" }, { "trust": 1.6, "url": "http://secunia.com/advisories/11861/" }, { "trust": 1.6, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000845" }, { "trust": 1.4, "url": "http://xforce.iss.net/xforce/xfdb/16412" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2915" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9426" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16412" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108786114032681\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=108793699910896\u0026w=2" }, { "trust": 1.0, "url": "http://marc.info/?l=linux-kernel\u0026m=108681568931323\u0026w=2" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0554" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0554" }, { "trust": 0.6, "url": "http://rhn.redhat.com/errata/rhsa-2004-255.html" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:9426" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=linux-kernel\u0026m=108681568931323\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108793699910896\u0026w=2" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=108786114032681\u0026w=2" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2915" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-260.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2004-327.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0489" }, { "trust": 0.3, "url": "http://www.debian.org/security/faq" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0394" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0427" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0554" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0447" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0124" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0001" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0997" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0565" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-1333" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2003-0984" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0949" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0883" }, { "trust": 0.3, "url": "http://packages.debian.org/\u003cpkg\u003e" }, { "trust": 0.3, "url": "http://security.debian.org/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0685" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-1016" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2005-0528" }, { "trust": 0.3, "url": "http://www.debian.org/security/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-1017" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-1335" }, { "trust": 0.2, "url": "http://secunia.com/" }, { "trust": 0.2, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108786114032681\u0026amp;w=2" }, { "trust": 0.1, "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000845" }, { "trust": 0.1, "url": "http://marc.info/?l=bugtraq\u0026amp;m=108793699910896\u0026amp;w=2" }, { "trust": 0.1, "url": "http://marc.info/?l=linux-kernel\u0026amp;m=108681568931323\u0026amp;w=2" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-doc-2.4.16_2.4.16-1woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-headers-2.4.16_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb" } ], "sources": [ { "db": "CERT/CC", "id": "VU#973654" }, { "db": "VULHUB", "id": "VHN-8984" }, { "db": "BID", "id": "10538" }, { "db": "BID", "id": "10566" }, { "db": "JVNDB", "id": "JVNDB-2004-000225" }, { "db": "PACKETSTORM", "id": "46506" }, { "db": "PACKETSTORM", "id": "46508" }, { "db": "PACKETSTORM", "id": "46509" }, { "db": "CNNVD", "id": "CNNVD-200408-053" }, { "db": "NVD", "id": "CVE-2004-0554" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#973654" }, { "db": "VULHUB", "id": "VHN-8984" }, { "db": "BID", "id": "10538" }, { "db": "BID", "id": "10566" }, { "db": "JVNDB", "id": "JVNDB-2004-000225" }, { "db": "PACKETSTORM", "id": "46506" }, { "db": "PACKETSTORM", "id": "46508" }, { "db": "PACKETSTORM", "id": "46509" }, { "db": "CNNVD", "id": "CNNVD-200408-053" }, { "db": "NVD", "id": "CVE-2004-0554" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-06-15T00:00:00", "db": "CERT/CC", "id": "VU#973654" }, { "date": "2004-08-06T00:00:00", "db": "VULHUB", "id": "VHN-8984" }, { "date": "2004-06-14T00:00:00", "db": "BID", "id": "10538" }, { "date": "2004-06-18T00:00:00", "db": "BID", "id": "10566" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000225" }, { "date": "2006-05-22T06:29:12", "db": "PACKETSTORM", "id": "46506" }, { "date": "2006-05-22T06:33:40", "db": "PACKETSTORM", "id": "46508" }, { "date": "2006-05-22T06:34:27", "db": "PACKETSTORM", "id": "46509" }, { "date": "2004-06-18T00:00:00", "db": "CNNVD", "id": "CNNVD-200408-053" }, { "date": "2004-08-06T04:00:00", "db": "NVD", "id": "CVE-2004-0554" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-08-23T00:00:00", "db": "CERT/CC", "id": "VU#973654" }, { "date": "2017-10-11T00:00:00", "db": "VULHUB", "id": "VHN-8984" }, { "date": "2010-08-05T19:46:00", "db": "BID", "id": "10538" }, { "date": "2007-01-17T21:30:00", "db": "BID", "id": "10566" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2004-000225" }, { "date": "2005-10-20T00:00:00", "db": "CNNVD", "id": "CNNVD-200408-053" }, { "date": "2017-10-11T01:29:28.200000", "db": "NVD", "id": "CVE-2004-0554" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "10538" }, { "db": "BID", "id": "10566" }, { "db": "CNNVD", "id": "CNNVD-200408-053" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux Kernel Multiple Device Driver Vulnerabilities", "sources": [ { "db": "BID", "id": "10566" }, { "db": "CNNVD", "id": "CNNVD-200408-053" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unknown", "sources": [ { "db": "BID", "id": "10566" }, { "db": "CNNVD", "id": "CNNVD-200408-053" } ], "trust": 0.9 } }
ghsa-7hp5-737x-3jmh
Vulnerability from github
Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program.
{ "affected": [], "aliases": [ "CVE-2004-0554" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2004-08-06T04:00:00Z", "severity": "LOW" }, "details": "Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a \"crash.c\" program.", "id": "GHSA-7hp5-737x-3jmh", "modified": "2022-04-29T02:57:55Z", "published": "2022-04-29T02:57:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0554" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16412" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2915" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9426" }, { "type": "WEB", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000845" }, { "type": "WEB", "url": "http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905" }, { "type": "WEB", "url": "http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html" }, { "type": "WEB", "url": "http://lwn.net/Articles/91155" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=108786114032681\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=108793699910896\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=108681568931323\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/20162" }, { "type": "WEB", "url": "http://secunia.com/advisories/20163" }, { "type": "WEB", "url": "http://secunia.com/advisories/20202" }, { "type": "WEB", "url": "http://secunia.com/advisories/20338" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200407-02.xml" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/973654" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:062" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2004_17_kernel.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-255.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-260.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/10538" }, { "type": "WEB", "url": "http://www.trustix.net/errata/2004/0034" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.