Action not permitted
Modal body text goes here.
cve-2004-1073
Vulnerability from cvelistv5
Published
2004-12-01 05:00
Modified
2024-08-08 00:39
Severity ?
EPSS score ?
Summary
The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:39:00.863Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20163" }, { "name": "18684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18684" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt" }, { "name": "FLSA:2336", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "20162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20162" }, { "name": "linux-elf-setuid-gain-privileges(18025)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18025" }, { "name": "RHSA-2006:0190", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "name": "RHSA-2004:549", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-549.html" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "11646", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11646" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "RHSA-2005:293", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "RHSA-2004:505", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20202" }, { "name": "RHSA-2004:504", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "oval:org.mitre.oval:def:11503", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503" }, { "name": "RHSA-2006:0191", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0191.html" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20338" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-11-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20163" }, { "name": "18684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18684" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt" }, { "name": "FLSA:2336", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "20162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20162" }, { "name": "linux-elf-setuid-gain-privileges(18025)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18025" }, { "name": "RHSA-2006:0190", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "name": "RHSA-2004:549", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-549.html" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "11646", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11646" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "RHSA-2005:293", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "RHSA-2004:505", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20202" }, { "name": "RHSA-2004:504", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "oval:org.mitre.oval:def:11503", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503" }, { "name": "RHSA-2006:0191", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0191.html" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20338" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "18684", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18684" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt", "refsource": "MISC", "url": "http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt" }, { "name": "FLSA:2336", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "20162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20162" }, { "name": "linux-elf-setuid-gain-privileges(18025)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18025" }, { "name": "RHSA-2006:0190", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "name": "RHSA-2004:549", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-549.html" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "11646", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11646" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "RHSA-2005:293", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "RHSA-2004:505", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "RHSA-2004:504", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "oval:org.mitre.oval:def:11503", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503" }, { "name": "RHSA-2006:0191", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0191.html" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1073", "datePublished": "2004-12-01T05:00:00", "dateReserved": "2004-11-29T00:00:00", "dateUpdated": "2024-08-08T00:39:00.863Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-1073\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-01-10T05:00:00.000\",\"lastModified\":\"2017-10-11T01:29:41.513\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n open_exec en la funcionalidad execve (exec.c) en el kernel de Linux 2.4.x hasta 2.3.27, y 2.6.x hasta 2.6.8, permite a usuarios locales leer binarios ELF no legibles usando la funcionalidad de int\u00e9rprete (PT_INTERP)..\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":2.1},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E244C37-E366-482E-9173-9376D0839839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F96BB9-6509-4F1E-9590-E55EE8C6F992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*\",\"matchCriteriaId\":\"12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"718D4631-440E-4783-8966-B2A2D3EF89B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6111EDDB-065F-4AD1-925C-E0A3C1DE26AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A2F7E7-0C51-43F2-BCEA-01FF738971D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"7015F57A-1E3B-42D2-9D12-F695078EFB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"467721EE-5130-46C5-BBB7-0F4878F3F171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"171257E7-12C5-4283-88F7-FFE643995563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"0887E02F-9F36-41F0-9F75-060B8414D7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F49A384-7222-41F3-9BE1-4E18C00E50A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05520FE3-C48D-42E8-BC24-C2396BD46CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D865FBB6-E07D-492F-A75E-168B06C8ADEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F24C2-0366-4799-865C-5EE4572B734B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0399660-6385-45AB-9785-E504D8788146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCBC50EA-130C-41B7-83EA-C523B3C3AAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91F6CBE-400F-4D0B-B893-34577B47A342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1548ECFD-FCB5-4AE0-9788-42F61F25489F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABB9787-5497-4BDC-8952-F99CF60A89BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615F6BA2-CD51-4159-B28A-A018CA9FC25C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093848CB-68A1-4258-8357-373A477FE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E275F440-A427-465F-B314-BF0730C781DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98651D39-60CF-409F-8276-DBBB56B972AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067B8E09-C923-4DDA-92DB-4A2892CB526A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBE3738-E530-4EC6-9FC6-1A063605BE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"D77F8919-4064-4EA5-A948-76178EA21F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7C423D-23DE-4C7B-A518-66F87E041925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA1382E-71B0-4E65-A310-716A244F4FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"824BBD31-8F3B-4F05-981B-ABF662BBF5F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*\",\"matchCriteriaId\":\"388A5C99-1F60-4C20-9AE5-6E73E5A3F819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F677E992-8D37-438F-97DF-9D98B28F020C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5888F8D7-15C2-4435-BB3C-8674DFAF0089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"29439AD0-EB8D-4675-A77A-6548FF27ADA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F27AADF6-1605-47FC-8C4D-87827A578A90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42F4080-A76F-4D17-85E2-CD2D2E4D0450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6968EF1D-7CC5-430D-866D-206F66486F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E6F5C5-BF74-4C10-830A-F232D528D290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476687F9-722B-490C-BD0B-B5F2CD7891DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A399D94B-D08D-4454-A07A-6634C9AE612F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD8E4AE-FEF7-4CE2-B338-4F766921593F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A8B50A-73F6-4FCF-A81F-FB624FBA7143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9336ABDF-9928-49F6-BAA7-D6E9829F9B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D27D843-2DA7-4481-857C-09FDC4FBD45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB93128-2743-4668-8C48-9B7282D4A672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040991B8-FB4B-480B-B53B-AA7A884F9F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA592BC-5846-4FC1-B2A7-13E622705DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59688C40-C92F-431E-ADD7-6782622862D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5FE15BF-91C7-452A-BE1B-7EC9632421C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"15C1923C-D9C4-400D-9F0F-20B519EEC9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51913F9-FC7D-450A-9A82-5084AA74A5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62E02D5-9EEE-439B-A510-BEEE28A9F358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"02278C07-E649-427D-9E5C-F1738A01BCBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2255842B-34CD-4062-886C-37161A065703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0ED322D-004C-472E-A37F-89B78C55FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"412F7334-C46B-4F61-B38A-2CA56B498151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5967AF83-798D-4B1E-882A-5737FFC859C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90D2123-D55B-4104-8D82-5B6365AA3B77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCDFD49-D402-420E-92F5-20445A0FE139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8877D178-1655-46E9-8F5A-2DD576601F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8358E965-3689-4B05-8470-C4A1463FA0E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C14A949-E2B8-4100-8ED4-645CB996B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0934C49-5F88-4189-BD88-2F32C39C2F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B0A230-4054-4483-A3A7-9A5A286C7552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F90242EF-048B-4539-AA41-87AA84875A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4E9325-2A70-4E15-9AAF-5588BF218055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"01402A85-B681-4DE0-B7BB-F52567DA29E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC53528-A67F-42DF-B8DA-778A65893F9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"2641EE56-6F9D-400B-B456-877F4DA79B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*\",\"matchCriteriaId\":\"A4A9461E-C117-42EC-9F14-DF2A82BA7C5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"E0B458EA-495E-40FA-9379-C03757F7B1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*\",\"matchCriteriaId\":\"409E324A-C040-494F-A026-9DCAE01C07F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"1728AB5D-55A9-46B0-A412-6F7263CAEB5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*\",\"matchCriteriaId\":\"6474B775-C893-491F-A074-802AFB1FEDD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*\",\"matchCriteriaId\":\"78B46FFA-5B09-473E-AD33-3DB18BD0DAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"EC79FF22-2664-4C40-B0B3-6D23B5F45162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*\",\"matchCriteriaId\":\"0EFE2E73-9536-41A9-B83B-0A06B54857F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6996B14-925B-46B8-982F-3545328B506B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC80CF67-C51D-442C-9526-CFEDE84A6304\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*\",\"matchCriteriaId\":\"84A50ED3-FD0D-4038-B3E7-CC65D166C968\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*\",\"matchCriteriaId\":\"777F9EC0-2919-45CA-BFF8-78A02537C513\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*\",\"matchCriteriaId\":\"C7EAAD04-D7C4-43DE-B488-1AAD014B503E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"D2E2EF3C-1379-4CBE-8FF5-DACD47834651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8C55338-3372-413F-82E3-E1B476D6F41A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0E2D3B-B50A-46C2-BA1E-3E014DE91954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"F7446746-87B7-4BD3-AABF-1E0FAA8265AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"56EF103F-5668-4754-A83B-D3662D0CE815\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFABFCE5-4F86-4AE8-9849-BC360AC72098\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39605B96-BAD6-45C9-BB9A-43D6E2C51ADD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67735E5-E43E-4164-BDB2-ADC6E0288E9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AB70F82-52BB-4D0D-9A24-9AF67278466D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B484D091-62DE-4EF2-AC54-26896CA8B315\"}]}]}],\"references\":[{\"url\":\"http://secunia.com/advisories/18684\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20162\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20163\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20202\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20338\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1067\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1069\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1070\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1082\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:022\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-504.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-505.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2004-549.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-293.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0190.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0191.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/11646\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.fedora.us/show_bug.cgi?id=2336\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18025\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2004_549
Vulnerability from csaf_redhat
Published
2004-12-02 10:13
Modified
2024-11-14 10:03
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in Red Hat
Enterprise Linux 3 are now available.
Details
The Linux kernel handles the basic functions of the operating system.
This update includes fixes for several security issues:
A missing serialization flaw in unix_dgram_recvmsg was discovered that
affects kernels prior to 2.4.28. A local user could potentially make
use of a race condition in order to gain privileges. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2004-1068 to this issue.
Paul Starzetz of iSEC discovered various flaws in the ELF binary
loader affecting kernels prior to 2.4.28. A local user could use thse
flaws to gain read access to executable-only binaries or possibly gain
privileges. (CAN-2004-1070, CAN-2004-1071, CAN-2004-1072, CAN-2004-1073)
A flaw when setting up TSS limits was discovered that affects AMD AMD64
and Intel EM64T architecture kernels prior to 2.4.23. A local user could
use this flaw to cause a denial of service (crash) or possibly gain
privileges. (CAN-2004-0812)
An integer overflow flaw was discovered in the ubsec_keysetup function
in the Broadcom 5820 cryptonet driver. On systems using this driver,
a local user could cause a denial of service (crash) or possibly gain
elevated privileges. (CAN-2004-0619)
Stefan Esser discovered various flaws including buffer overflows in
the smbfs driver affecting kernels prior to 2.4.28. A local user may be
able to cause a denial of service (crash) or possibly gain privileges.
In order to exploit these flaws the user would require control of
a connected Samba server. (CAN-2004-0883, CAN-2004-0949)
SGI discovered a bug in the elf loader that affects kernels prior to
2.4.25 which could be triggered by a malformed binary. On
architectures other than x86, a local user could create a malicious
binary which could cause a denial of service (crash). (CAN-2004-0136)
Conectiva discovered flaws in certain USB drivers affecting kernels
prior to 2.4.27 which used the copy_to_user function on uninitialized
structures. These flaws could allow local users to read small amounts
of kernel memory. (CAN-2004-0685)
All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 3 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis update includes fixes for several security issues:\n\nA missing serialization flaw in unix_dgram_recvmsg was discovered that\naffects kernels prior to 2.4.28. A local user could potentially make\nuse of a race condition in order to gain privileges. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2004-1068 to this issue.\n\nPaul Starzetz of iSEC discovered various flaws in the ELF binary\nloader affecting kernels prior to 2.4.28. A local user could use thse\nflaws to gain read access to executable-only binaries or possibly gain\nprivileges. (CAN-2004-1070, CAN-2004-1071, CAN-2004-1072, CAN-2004-1073)\n\nA flaw when setting up TSS limits was discovered that affects AMD AMD64\nand Intel EM64T architecture kernels prior to 2.4.23. A local user could\nuse this flaw to cause a denial of service (crash) or possibly gain\nprivileges. (CAN-2004-0812)\n\nAn integer overflow flaw was discovered in the ubsec_keysetup function\nin the Broadcom 5820 cryptonet driver. On systems using this driver,\na local user could cause a denial of service (crash) or possibly gain\nelevated privileges. (CAN-2004-0619)\n\nStefan Esser discovered various flaws including buffer overflows in\nthe smbfs driver affecting kernels prior to 2.4.28. A local user may be\nable to cause a denial of service (crash) or possibly gain privileges.\nIn order to exploit these flaws the user would require control of\na connected Samba server. (CAN-2004-0883, CAN-2004-0949)\n\nSGI discovered a bug in the elf loader that affects kernels prior to\n2.4.25 which could be triggered by a malformed binary. On\narchitectures other than x86, a local user could create a malicious\nbinary which could cause a denial of service (crash). (CAN-2004-0136)\n\nConectiva discovered flaws in certain USB drivers affecting kernels\nprior to 2.4.27 which used the copy_to_user function on uninitialized\nstructures. These flaws could allow local users to read small amounts\nof kernel memory. (CAN-2004-0685)\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:549", "url": "https://access.redhat.com/errata/RHSA-2004:549" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "127258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127258" }, { "category": "external", "summary": "127915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127915" }, { "category": "external", "summary": "127918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127918" }, { "category": "external", "summary": "134720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134720" }, { "category": "external", "summary": "134874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134874" }, { "category": "external", "summary": "134981", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134981" }, { "category": "external", "summary": "140710", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=140710" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_549.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T10:03:05+00:00", "generator": { "date": "2024-11-14T10:03:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2004:549", "initial_release_date": "2004-12-02T10:13:00+00:00", "revision_history": [ { "date": "2004-12-02T10:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-12-02T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:03:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-20.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-20.0.1.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ia64", "product_id": "kernel-source-0:2.4.21-20.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-20.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-20.0.1.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ia64", "product_id": "kernel-doc-0:2.4.21-20.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-20.0.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.ia64", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.ia64", "product_id": "kernel-0:2.4.21-20.0.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-20.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-20.0.1.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.i686", "product_id": "kernel-smp-0:2.4.21-20.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-20.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-20.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-20.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-20.0.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.i686", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.i686", "product_id": "kernel-0:2.4.21-20.0.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-20.0.1.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.athlon", "product_id": "kernel-smp-0:2.4.21-20.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-20.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-20.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-20.0.1.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.athlon", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.athlon", "product_id": "kernel-0:2.4.21-20.0.1.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-20.0.1.EL.i386", "product": { "name": "kernel-source-0:2.4.21-20.0.1.EL.i386", "product_id": "kernel-source-0:2.4.21-20.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-20.0.1.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-20.0.1.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.i386", "product_id": "kernel-doc-0:2.4.21-20.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-20.0.1.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-20.0.1.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-20.0.1.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.ia32e", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.ia32e", "product_id": "kernel-0:2.4.21-20.0.1.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-20.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-20.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-20.0.1.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-20.0.1.EL.x86_64", "product_id": "kernel-source-0:2.4.21-20.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-20.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-20.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-20.0.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.x86_64", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.x86_64", "product_id": "kernel-0:2.4.21-20.0.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.src", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.src", "product_id": "kernel-0:2.4.21-20.0.1.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-20.0.1.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ppc64", "product_id": "kernel-source-0:2.4.21-20.0.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-20.0.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-20.0.1.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-20.0.1.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-20.0.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-20.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-20.0.1.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390x", "product_id": "kernel-source-0:2.4.21-20.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-20.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390x", "product_id": "kernel-doc-0:2.4.21-20.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-20.0.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.s390x", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.s390x", "product_id": "kernel-0:2.4.21-20.0.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-20.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-20.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-20.0.1.EL.s390", "product": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390", "product_id": "kernel-source-0:2.4.21-20.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-20.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390", "product_id": "kernel-doc-0:2.4.21-20.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-20.0.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-20.0.1.EL.s390", "product": { "name": "kernel-0:2.4.21-20.0.1.EL.s390", "product_id": "kernel-0:2.4.21-20.0.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-20.0.1.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.src" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0138", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617159" } ], "notes": [ { "category": "description", "text": "The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0138" }, { "category": "external", "summary": "RHBZ#1617159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617159" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0138", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0138" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0138", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0138" } ], "release_date": "2004-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0619", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617240" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ubsec_keysetup function for Linux Broadcom 5820 cryptonet driver allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a negative add_dsa_buf_bytes variable, which leads to a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0619" }, { "category": "external", "summary": "RHBZ#1617240", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617240" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0619", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0619" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0619", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0619" } ], "release_date": "2004-06-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0685", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617249" } ], "notes": [ { "category": "description", "text": "Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0685" }, { "category": "external", "summary": "RHBZ#1617249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0685", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685" } ], "release_date": "2003-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "title": "security flaw" }, { "cve": "CVE-2004-0812", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617300" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with \"setting up TSS limits,\" allows local users to cause a denial of service (crash) and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0812" }, { "category": "external", "summary": "RHBZ#1617300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0812", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0812" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0812", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0812" } ], "release_date": "2003-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "title": "security flaw" }, { "cve": "CVE-2004-0883", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617312" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0883" }, { "category": "external", "summary": "RHBZ#1617312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0883", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0949", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617329" } ], "notes": [ { "category": "description", "text": "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0949" }, { "category": "external", "summary": "RHBZ#1617329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0949", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0949" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1068", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617362" } ], "notes": [ { "category": "description", "text": "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1068" }, { "category": "external", "summary": "RHBZ#1617362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068" } ], "release_date": "2004-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1070", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617363" } ], "notes": [ { "category": "description", "text": "The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1070" }, { "category": "external", "summary": "RHBZ#1617363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1070", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1070" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1071", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617364" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1071" }, { "category": "external", "summary": "RHBZ#1617364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1071", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1072", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617365" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1072" }, { "category": "external", "summary": "RHBZ#1617365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-02T10:13:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-0:2.4.21-20.0.1.EL.src", "3AS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-0:2.4.21-20.0.1.EL.src", "3Desktop:kernel-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.i386", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-0:2.4.21-20.0.1.EL.src", "3ES:kernel-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.i386", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-0:2.4.21-20.0.1.EL.src", "3WS:kernel-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-doc-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.i386", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.ppc64", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-source-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-source-0:2.4.21-20.0.1.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.i686", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-20.0.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:549" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2006_0190
Vulnerability from csaf_redhat
Published
2006-02-01 17:48
Modified
2024-11-05 16:36
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix a number of security issues as well as
other bugs are now available for Red Hat Enterprise Linux 2.1 (64 bit
architectures).
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described
below:
- a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)
- a race condition that allowed local users to read the environment
variables of another process (CVE-2004-1058, low)
- a flaw in the open_exec function of execve that allowed a local user to
read setuid ELF binaries that should otherwise be protected by standard
permissions. (CVE-2004-1073, moderate). Red Hat originally reported this
flaw as being fixed by RHSA-2004:504, but a patch for this issue was
missing from that update.
- a potential leak of kernel data from ext2 file system handling
(CVE-2005-0400, low)
- flaws in ISO-9660 file system handling that allowed the mounting of
an invalid image on a CD-ROM to cause a denial of service (crash)
or potentially execute arbitrary code (CVE-2005-0815, moderate)
- a flaw in gzip/zlib handling internal to the kernel that may allow a
local user to cause a denial of service (crash) (CVE-2005-2458, low)
- a flaw in exec() handling on some 64-bit architectures that allowed a
local user to cause a denial of service (crash) (CVE-2005-2708, important)
- a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)
- a flaw in IPv6 network UDP port hash table lookups that allowed a local
user to cause a denial of service (hang) (CVE-2005-2973, important)
- a network buffer info leak using the orinoco driver that allowed a remote
user to possibly view uninitialized data (CVE-2005-3180, important)
- a race condition affecting SMP systems that allowed a local user to cause
a denial of service (crash) (CVE-2005-3274, important)
- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a
local user to cause a denial of service (crash) (CVE-2005-3275, important)
- a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)
The following bugs were also addressed:
- Handle set_brk() errors in binfmt_elf
- Correct scsi error return
All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix a number of security issues as well as\nother bugs are now available for Red Hat Enterprise Linux 2.1 (64 bit\narchitectures).\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues described\nbelow:\n\n- a flaw in network IGMP processing that a allowed a remote user on the\nlocal network to cause a denial of service (disabling of multicast reports)\nif the system is running multicast applications (CVE-2002-2185, moderate) \n\n- a race condition that allowed local users to read the environment\nvariables of another process (CVE-2004-1058, low)\n\n- a flaw in the open_exec function of execve that allowed a local user to\nread setuid ELF binaries that should otherwise be protected by standard\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\nmissing from that update.\n\n- a potential leak of kernel data from ext2 file system handling\n(CVE-2005-0400, low) \n\n- flaws in ISO-9660 file system handling that allowed the mounting of\nan invalid image on a CD-ROM to cause a denial of service (crash)\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \n\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \n\n- a flaw in exec() handling on some 64-bit architectures that allowed a\nlocal user to cause a denial of service (crash) (CVE-2005-2708, important) \n\n- a flaw in procfs handling during unloading of modules that allowed a\nlocal user to cause a denial of service or potentially gain privileges\n(CVE-2005-2709, moderate) \n\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \n\n- a network buffer info leak using the orinoco driver that allowed a remote\nuser to possibly view uninitialized data (CVE-2005-3180, important) \n\n- a race condition affecting SMP systems that allowed a local user to cause\na denial of service (crash) (CVE-2005-3274, important)\n\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \n\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\ndenial of service (crash) (CVE-2005-3806, important) \n\nThe following bugs were also addressed:\n\n- Handle set_brk() errors in binfmt_elf\n\n- Correct scsi error return\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0190", "url": "https://access.redhat.com/errata/RHSA-2006:0190" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "133117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=133117" }, { "category": "external", "summary": "144172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144172" }, { "category": "external", "summary": "152402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152402" }, { "category": "external", "summary": "152408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152408" }, { "category": "external", "summary": "152554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152554" }, { "category": "external", "summary": "165681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165681" }, { "category": "external", "summary": "168313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168313" }, { "category": "external", "summary": "168927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168927" }, { "category": "external", "summary": "170279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170279" }, { "category": "external", "summary": "170775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170775" }, { "category": "external", "summary": "171385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171385" }, { "category": "external", "summary": "171388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171388" }, { "category": "external", "summary": "174083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174083" }, { "category": "external", "summary": "174810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174810" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0190.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-05T16:36:05+00:00", "generator": { "date": "2024-11-05T16:36:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2006:0190", "initial_release_date": "2006-02-01T17:48:00+00:00", "revision_history": [ { "date": "2006-02-01T17:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-02-01T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:36:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-2185", "discovery_date": "2005-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616930" } ], "notes": [ { "category": "description", "text": "The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target\u0027s Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-2185" }, { "category": "external", "summary": "RHBZ#1616930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-2185", "url": "https://www.cve.org/CVERecord?id=CVE-2002-2185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185" } ], "release_date": "2002-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1058", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617360" } ], "notes": [ { "category": "description", "text": "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1058" }, { "category": "external", "summary": "RHBZ#1617360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1058", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058" } ], "release_date": "2004-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0400", "discovery_date": "2005-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617518" } ], "notes": [ { "category": "description", "text": "The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0400" }, { "category": "external", "summary": "RHBZ#1617518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617518" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0400", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0400" } ], "release_date": "2005-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-0815", "discovery_date": "2005-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617584" } ], "notes": [ { "category": "description", "text": "Multiple \"range checking flaws\" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0815" }, { "category": "external", "summary": "RHBZ#1617584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0815", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0815" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0815", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0815" } ], "release_date": "2005-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2458", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617720" } ], "notes": [ { "category": "description", "text": "inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with \"improper tables\".", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2458" }, { "category": "external", "summary": "RHBZ#1617720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2458", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458" } ], "release_date": "1999-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-2708", "discovery_date": "2005-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617750" } ], "notes": [ { "category": "description", "text": "The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2708" }, { "category": "external", "summary": "RHBZ#1617750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2708", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2708" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2708", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2708" } ], "release_date": "2005-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2709", "discovery_date": "2005-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617751" } ], "notes": [ { "category": "description", "text": "The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2709" }, { "category": "external", "summary": "RHBZ#1617751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2709", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709" } ], "release_date": "2005-11-08T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2973", "discovery_date": "2005-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617770" } ], "notes": [ { "category": "description", "text": "The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2973" }, { "category": "external", "summary": "RHBZ#1617770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2973", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2973" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2973", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2973" } ], "release_date": "2005-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3180", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617790" } ], "notes": [ { "category": "description", "text": "The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3180" }, { "category": "external", "summary": "RHBZ#1617790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617790" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3180", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3180" } ], "release_date": "2005-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3274", "discovery_date": "2005-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617811" } ], "notes": [ { "category": "description", "text": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3274" }, { "category": "external", "summary": "RHBZ#1617811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617811" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3274", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274" } ], "release_date": "2005-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3275", "discovery_date": "2005-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617812" } ], "notes": [ { "category": "description", "text": "The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3275" }, { "category": "external", "summary": "RHBZ#1617812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617812" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3275", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275" } ], "release_date": "2005-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3806", "discovery_date": "2005-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617840" } ], "notes": [ { "category": "description", "text": "The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3806" }, { "category": "external", "summary": "RHBZ#1617840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806" } ], "release_date": "2005-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2004_504
Vulnerability from csaf_redhat
Published
2004-12-13 20:17
Modified
2024-11-14 10:02
Summary
Red Hat Security Advisory: Updated Itanium kernel packages resolve security issues
Notes
Topic
Updated Itanium kernel packages are now available as part of ongoing
support and maintenance of Red Hat Enterprise Linux version 2.1. This is
the sixth regular update.
Details
The Linux kernel handles the basic functions of the operating system.
This is the sixth regular Itanium kernel update to Red Hat Enterprise Linux
version 2.1. This kernel updates several important drivers and fixes a
number of bugs.
This update includes fixes for several security issues:
Paul Starzetz of iSEC discovered various flaws in the ELF binary
loader affecting kernels prior to 2.4.28. A local user could use these
flaws to gain read access to executable-only binaries or possibly gain
privileges. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071,
CAN-2004-1072, and CAN-2004-1073 to these issues.
A missing serialization flaw in unix_dgram_recvmsg was discovered that
affects kernels prior to 2.4.28. A local user could potentially make
use of a race condition in order to gain privileges. (CAN-2004-1068)
SGI discovered a bug in the elf loader that affects kernels before
2.4.25 which could be triggered by a malformed binary. On
architectures other than x86, a local user could create a malicious
binary which could cause a denial of service (crash). (CAN-2004-0136)
Stefan Esser discovered various flaws including buffer overflows in
the smbfs driver affecting kernels before 2.4.28. A local user may be
able to cause a denial of service (crash) or possibly gain privileges.
In order to exploit these flaws the user would need to have control of
a connected smb server. (CAN-2004-0883, CAN-2004-0949)
A floating point information leak was discovered in the ia64 architecture
context switch code in kernels before 2.4.27. A local user could use this
flaw to read register values of other processes by setting the MFH bit.
(CAN-2004-0565)
Conectiva discovered flaws in certain USB drivers affecting kernels
before 2.4.27 which used the copy_to_user function on uninitialized
structures. These flaws could allow local users to read small amounts of
kernel memory. (CAN-2004-0685)
The ext3 and jfs code in kernels before 2.4.26 did not properly initialize
journal descriptor blocks. A privileged local user could read portions of
kernel memory. (CAN-2004-0177, CAN-2004-0181)
The following drivers have been updated:
* fusion to 2.05.16.16.02
* e1000 to 5.3.19-k2
* e100 to 3.0.27-k2
All Red Hat Enterprise Linux 2.1 users running Itanium are advised to
upgrade their kernels to the packages listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Itanium kernel packages are now available as part of ongoing\nsupport and maintenance of Red Hat Enterprise Linux version 2.1. This is\nthe sixth regular update.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the sixth regular Itanium kernel update to Red Hat Enterprise Linux\nversion 2.1. This kernel updates several important drivers and fixes a\nnumber of bugs.\n\nThis update includes fixes for several security issues:\n\nPaul Starzetz of iSEC discovered various flaws in the ELF binary\nloader affecting kernels prior to 2.4.28. A local user could use these\nflaws to gain read access to executable-only binaries or possibly gain\nprivileges. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071,\nCAN-2004-1072, and CAN-2004-1073 to these issues.\n\nA missing serialization flaw in unix_dgram_recvmsg was discovered that\naffects kernels prior to 2.4.28. A local user could potentially make\nuse of a race condition in order to gain privileges. (CAN-2004-1068)\n\nSGI discovered a bug in the elf loader that affects kernels before\n2.4.25 which could be triggered by a malformed binary. On\narchitectures other than x86, a local user could create a malicious\nbinary which could cause a denial of service (crash). (CAN-2004-0136)\n\nStefan Esser discovered various flaws including buffer overflows in\nthe smbfs driver affecting kernels before 2.4.28. A local user may be\nable to cause a denial of service (crash) or possibly gain privileges.\nIn order to exploit these flaws the user would need to have control of\na connected smb server. (CAN-2004-0883, CAN-2004-0949)\n\nA floating point information leak was discovered in the ia64 architecture\ncontext switch code in kernels before 2.4.27. A local user could use this\nflaw to read register values of other processes by setting the MFH bit.\n(CAN-2004-0565)\n\nConectiva discovered flaws in certain USB drivers affecting kernels\nbefore 2.4.27 which used the copy_to_user function on uninitialized\nstructures. These flaws could allow local users to read small amounts of\nkernel memory. (CAN-2004-0685)\n\nThe ext3 and jfs code in kernels before 2.4.26 did not properly initialize\njournal descriptor blocks. A privileged local user could read portions of\nkernel memory. (CAN-2004-0177, CAN-2004-0181)\n\nThe following drivers have been updated:\n\n* fusion to 2.05.16.16.02\n* e1000 to 5.3.19-k2\n* e100 to 3.0.27-k2\n\nAll Red Hat Enterprise Linux 2.1 users running Itanium are advised to\nupgrade their kernels to the packages listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:504", "url": "https://access.redhat.com/errata/RHSA-2004:504" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "121034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121034" }, { "category": "external", "summary": "121040", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121040" }, { "category": "external", "summary": "124832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=124832" }, { "category": "external", "summary": "126127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126127" }, { "category": "external", "summary": "127385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127385" }, { "category": "external", "summary": "127916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127916" }, { "category": "external", "summary": "127920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127920" }, { "category": "external", "summary": "131493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131493" }, { "category": "external", "summary": "134722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134722" }, { "category": "external", "summary": "134802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134802" }, { "category": "external", "summary": "134876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134876" }, { "category": "external", "summary": "137446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137446" }, { "category": "external", "summary": "138443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138443" }, { "category": "external", "summary": "140712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=140712" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_504.json" } ], "title": "Red Hat Security Advisory: Updated Itanium kernel packages resolve security issues", "tracking": { "current_release_date": "2024-11-14T10:02:58+00:00", "generator": { "date": "2024-11-14T10:02:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2004:504", "initial_release_date": "2004-12-13T20:17:00+00:00", "revision_history": [ { "date": "2004-12-13T20:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-12-13T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:02:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0138", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617159" } ], "notes": [ { "category": "description", "text": "The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0138" }, { "category": "external", "summary": "RHBZ#1617159", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617159" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0138", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0138" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0138", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0138" } ], "release_date": "2004-10-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0177", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617168" } ], "notes": [ { "category": "description", "text": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0177" }, { "category": "external", "summary": "RHBZ#1617168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0181", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617172" } ], "notes": [ { "category": "description", "text": "The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0181" }, { "category": "external", "summary": "RHBZ#1617172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0181", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0181" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0565", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617231" } ], "notes": [ { "category": "description", "text": "Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0565" }, { "category": "external", "summary": "RHBZ#1617231", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617231" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0565", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0565" } ], "release_date": "2004-05-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "title": "security flaw" }, { "cve": "CVE-2004-0685", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617249" } ], "notes": [ { "category": "description", "text": "Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0685" }, { "category": "external", "summary": "RHBZ#1617249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0685", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685" } ], "release_date": "2003-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "title": "security flaw" }, { "cve": "CVE-2004-0883", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617312" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0883" }, { "category": "external", "summary": "RHBZ#1617312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0883", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0949", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617329" } ], "notes": [ { "category": "description", "text": "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0949" }, { "category": "external", "summary": "RHBZ#1617329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0949", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0949" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1068", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617362" } ], "notes": [ { "category": "description", "text": "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1068" }, { "category": "external", "summary": "RHBZ#1617362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068" } ], "release_date": "2004-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1070", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617363" } ], "notes": [ { "category": "description", "text": "The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1070" }, { "category": "external", "summary": "RHBZ#1617363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1070", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1070" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1071", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617364" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1071" }, { "category": "external", "summary": "RHBZ#1617364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1071", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1072", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617365" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1072" }, { "category": "external", "summary": "RHBZ#1617365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:17:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:504" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2004_505
Vulnerability from csaf_redhat
Published
2004-12-13 20:06
Modified
2024-11-14 10:03
Summary
Red Hat Security Advisory: Updated kernel packages fix security vulnerability
Notes
Topic
Updated kernel packages are now available as part of ongoing
support and maintenance of Red Hat Enterprise Linux version
2.1. This is the sixth regular update.
Details
The Linux kernel handles the basic functions of the operating
system.
This is the sixth regular kernel update to Red Hat Enterprise Linux version
2.1. It updates a number of device drivers, and adds much improved SATA
support.
This update includes fixes for several security issues:
Paul Starzetz of iSEC discovered various flaws in the ELF binary
loader affecting kernels prior to 2.4.28. A local user could use these
flaws to gain read access to executable-only binaries or possibly gain
privileges. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071,
CAN-2004-1072, and CAN-2004-1073 to these issues.
A missing serialization flaw in unix_dgram_recvmsg was discovered that
affects kernels prior to 2.4.28. A local user could potentially make
use of a race condition in order to gain privileges. (CAN-2004-1068)
Stefan Esser discovered various flaws including buffer overflows in
the smbfs driver affecting kernels before 2.4.28. A local user may be
able to cause a denial of service (crash) or possibly gain privileges.
In order to exploit these flaws the user would need to have control of
a connected smb server. (CAN-2004-0883, CAN-2004-0949)
Conectiva discovered flaws in certain USB drivers affecting kernels
before 2.4.27 which used the copy_to_user function on uninitialized
structures. These flaws could allow local users to read small
amounts of kernel memory. (CAN-2004-0685)
The ext3 code in kernels before 2.4.26 did not properly initialize journal
descriptor blocks. A privileged local user could read portions of kernel
memory. (CAN-2004-0177)
The following drivers have also been updated:
* tg3 v3.10
* e1000 v5.3.19-k2
* e100 v3.0.27-k2
* megaraid
* megaraid2 v2.10.8.2
All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing\nsupport and maintenance of Red Hat Enterprise Linux version\n2.1. This is the sixth regular update.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating\nsystem.\n\nThis is the sixth regular kernel update to Red Hat Enterprise Linux version\n2.1. It updates a number of device drivers, and adds much improved SATA\nsupport.\n\nThis update includes fixes for several security issues:\n\nPaul Starzetz of iSEC discovered various flaws in the ELF binary\nloader affecting kernels prior to 2.4.28. A local user could use these\nflaws to gain read access to executable-only binaries or possibly gain\nprivileges. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the names CAN-2004-1070, CAN-2004-1071,\nCAN-2004-1072, and CAN-2004-1073 to these issues.\n\nA missing serialization flaw in unix_dgram_recvmsg was discovered that\naffects kernels prior to 2.4.28. A local user could potentially make\nuse of a race condition in order to gain privileges. (CAN-2004-1068)\n\nStefan Esser discovered various flaws including buffer overflows in\nthe smbfs driver affecting kernels before 2.4.28. A local user may be\nable to cause a denial of service (crash) or possibly gain privileges.\nIn order to exploit these flaws the user would need to have control of\na connected smb server. (CAN-2004-0883, CAN-2004-0949)\n\nConectiva discovered flaws in certain USB drivers affecting kernels\nbefore 2.4.27 which used the copy_to_user function on uninitialized\nstructures. These flaws could allow local users to read small\namounts of kernel memory. (CAN-2004-0685)\n\nThe ext3 code in kernels before 2.4.26 did not properly initialize journal\ndescriptor blocks. A privileged local user could read portions of kernel\nmemory. (CAN-2004-0177)\n\nThe following drivers have also been updated:\n\n* tg3 v3.10\n* e1000 v5.3.19-k2\n* e100 v3.0.27-k2\n* megaraid \n* megaraid2 v2.10.8.2\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2004:505", "url": "https://access.redhat.com/errata/RHSA-2004:505" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "75090", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=75090" }, { "category": "external", "summary": "99025", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=99025" }, { "category": "external", "summary": "111219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=111219" }, { "category": "external", "summary": "121033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121033" }, { "category": "external", "summary": "127916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127916" }, { "category": "external", "summary": "127919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=127919" }, { "category": "external", "summary": "129359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129359" }, { "category": "external", "summary": "131493", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131493" }, { "category": "external", "summary": "131534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131534" }, { "category": "external", "summary": "134721", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134721" }, { "category": "external", "summary": "134802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134802" }, { "category": "external", "summary": "134875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134875" }, { "category": "external", "summary": "137446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137446" }, { "category": "external", "summary": "138443", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138443" }, { "category": "external", "summary": "140711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=140711" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2004/rhsa-2004_505.json" } ], "title": "Red Hat Security Advisory: Updated kernel packages fix security vulnerability", "tracking": { "current_release_date": "2024-11-14T10:03:01+00:00", "generator": { "date": "2024-11-14T10:03:01+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2004:505", "initial_release_date": "2004-12-13T20:06:00+00:00", "revision_history": [ { "date": "2004-12-13T20:06:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2004-12-13T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:03:01+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0177", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617168" } ], "notes": [ { "category": "description", "text": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0177" }, { "category": "external", "summary": "RHBZ#1617168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0685", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617249" } ], "notes": [ { "category": "description", "text": "Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0685" }, { "category": "external", "summary": "RHBZ#1617249", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617249" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0685", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0685" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0685" } ], "release_date": "2003-10-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "title": "security flaw" }, { "cve": "CVE-2004-0883", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617312" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning more data than requested to the smb_proc_read function, (2) returning a data offset from outside the samba packet to the smb_proc_readX function, (3) sending a certain TRANS2 fragmented packet to the smb_receive_trans2 function, (4) sending a samba packet with a certain header size to the smb_proc_readX_data function, or (5) sending a certain packet based offset for the data in a packet to the smb_receive_trans2 function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0883" }, { "category": "external", "summary": "RHBZ#1617312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0883", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0883" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-0949", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617329" } ], "notes": [ { "category": "description", "text": "The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary kernel information or (2) raise a counter value to an arbitrary number by sending the first part of the fragmented packet multiple times.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0949" }, { "category": "external", "summary": "RHBZ#1617329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0949", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0949" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0949" } ], "release_date": "2004-11-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1068", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617362" } ], "notes": [ { "category": "description", "text": "A \"missing serialization\" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1068" }, { "category": "external", "summary": "RHBZ#1617362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617362" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1068", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1068" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1068" } ], "release_date": "2004-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1070", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617363" } ], "notes": [ { "category": "description", "text": "The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1070" }, { "category": "external", "summary": "RHBZ#1617363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617363" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1070", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1070" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1070" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1071", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617364" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1071" }, { "category": "external", "summary": "RHBZ#1617364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617364" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1071", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1071" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1072", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617365" } ], "notes": [ { "category": "description", "text": "The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1072" }, { "category": "external", "summary": "RHBZ#1617365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617365" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1072", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1072" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1072" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2004-12-13T20:06:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.\n\nIf up2date fails to connect to Red Hat Network due to SSL\nCertificate Errors, you need to install a version of the\nup2date client with an updated certificate. The latest version of\nup2date is available from the Red Hat FTP site and may also be\ndownloaded directly from the RHN website:\n\nhttps://rhn.redhat.com/help/latest-up2date.pxt", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2004:505" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2006_0191
Vulnerability from csaf_redhat
Published
2006-02-01 17:57
Modified
2024-11-05 16:36
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix a number of security issues as well as
other bugs are now available for Red Hat Enterprise Linux 2.1 (32 bit
architectures)
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described
below:
- a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)
- a race condition that allowed local users to read the environment
variables of another process (CVE-2004-1058, low)
- a flaw in the open_exec function of execve that allowed a local user to
read setuid ELF binaries that should otherwise be protected by standard
permissions. (CVE-2004-1073, moderate). Red Hat originally reported this
flaw as being fixed by RHSA-2004:504, but a patch for this issue was
missing from that update.
- a flaw in the coda module that allowed a local user to cause a denial of
service (crash) or possibly gain privileges (CVE-2005-0124, moderate)
- a potential leak of kernel data from ext2 file system handling
(CVE-2005-0400, low)
- flaws in ISO-9660 file system handling that allowed the mounting of
an invalid image on a CD-ROM to cause a denial of service (crash)
or potentially execute arbitrary code (CVE-2005-0815, moderate)
- a flaw in gzip/zlib handling internal to the kernel that may allow a
local user to cause a denial of service (crash) (CVE-2005-2458, low)
- a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)
- a flaw in IPv6 network UDP port hash table lookups that allowed a local
user to cause a denial of service (hang) (CVE-2005-2973, important)
- a network buffer info leak using the orinoco driver that allowed a remote
user to possibly view uninitialized data (CVE-2005-3180, important)
- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a
local user to cause a denial of service (crash) (CVE-2005-3275, important)
- a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)
The following bugs were also addressed:
- Handle set_brk() errors in binfmt_elf/aout
- Correct error handling in shmem_ioctl
- Correct scsi error return
- Fix netdump time keeping bug
- Fix netdump link-down freeze
- Fix FAT fs deadlock
All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix a number of security issues as well as\nother bugs are now available for Red Hat Enterprise Linux 2.1 (32 bit\narchitectures)\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system. \n\nThese new kernel packages contain fixes for the security issues described\nbelow:\n\n- a flaw in network IGMP processing that a allowed a remote user on the\nlocal network to cause a denial of service (disabling of multicast reports)\nif the system is running multicast applications (CVE-2002-2185, moderate) \n\n- a race condition that allowed local users to read the environment\nvariables of another process (CVE-2004-1058, low)\n\n- a flaw in the open_exec function of execve that allowed a local user to\nread setuid ELF binaries that should otherwise be protected by standard\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\nmissing from that update.\n\n- a flaw in the coda module that allowed a local user to cause a denial of\nservice (crash) or possibly gain privileges (CVE-2005-0124, moderate)\n\n- a potential leak of kernel data from ext2 file system handling\n(CVE-2005-0400, low) \n\n- flaws in ISO-9660 file system handling that allowed the mounting of\nan invalid image on a CD-ROM to cause a denial of service (crash)\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \n\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \n\n- a flaw in procfs handling during unloading of modules that allowed a\nlocal user to cause a denial of service or potentially gain privileges\n(CVE-2005-2709, moderate) \n\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \n\n- a network buffer info leak using the orinoco driver that allowed a remote\nuser to possibly view uninitialized data (CVE-2005-3180, important) \n\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \n\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\ndenial of service (crash) (CVE-2005-3806, important) \n\nThe following bugs were also addressed: \n\n- Handle set_brk() errors in binfmt_elf/aout\n\n- Correct error handling in shmem_ioctl\n\n- Correct scsi error return\n\n- Fix netdump time keeping bug\n\n- Fix netdump link-down freeze\n\n- Fix FAT fs deadlock\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0191", "url": "https://access.redhat.com/errata/RHSA-2006:0191" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "133115", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=133115" }, { "category": "external", "summary": "137214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137214" }, { "category": "external", "summary": "144155", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144155" }, { "category": "external", "summary": "146081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146081" }, { "category": "external", "summary": "152401", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152401" }, { "category": "external", "summary": "152407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152407" }, { "category": "external", "summary": "152553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152553" }, { "category": "external", "summary": "165682", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165682" }, { "category": "external", "summary": "168926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168926" }, { "category": "external", "summary": "170280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170280" }, { "category": "external", "summary": "170777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170777" }, { "category": "external", "summary": "171387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171387" }, { "category": "external", "summary": "174085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174085" }, { "category": "external", "summary": "174811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174811" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0191.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-05T16:36:11+00:00", "generator": { "date": "2024-11-05T16:36:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2006:0191", "initial_release_date": "2006-02-01T17:57:00+00:00", "revision_history": [ { "date": "2006-02-01T17:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-02-01T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:36:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-2185", "discovery_date": "2005-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616930" } ], "notes": [ { "category": "description", "text": "The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target\u0027s Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-2185" }, { "category": "external", "summary": "RHBZ#1616930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-2185", "url": "https://www.cve.org/CVERecord?id=CVE-2002-2185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185" } ], "release_date": "2002-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1058", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617360" } ], "notes": [ { "category": "description", "text": "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1058" }, { "category": "external", "summary": "RHBZ#1617360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1058", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058" } ], "release_date": "2004-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0124", "discovery_date": "2005-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617464" } ], "notes": [ { "category": "description", "text": "The coda_pioctl function in the coda functionality (pioctl.c) for Linux kernel 2.6.9 and 2.4.x before 2.4.29 may allow local users to cause a denial of service (crash) or execute arbitrary code via negative vi.in_size or vi.out_size values, which may trigger a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0124" }, { "category": "external", "summary": "RHBZ#1617464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0124", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0124" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0124", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0124" } ], "release_date": "2005-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0400", "discovery_date": "2005-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617518" } ], "notes": [ { "category": "description", "text": "The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0400" }, { "category": "external", "summary": "RHBZ#1617518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617518" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0400", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0400" } ], "release_date": "2005-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-0815", "discovery_date": "2005-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617584" } ], "notes": [ { "category": "description", "text": "Multiple \"range checking flaws\" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0815" }, { "category": "external", "summary": "RHBZ#1617584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0815", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0815" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0815", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0815" } ], "release_date": "2005-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2458", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617720" } ], "notes": [ { "category": "description", "text": "inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with \"improper tables\".", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2458" }, { "category": "external", "summary": "RHBZ#1617720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2458", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458" } ], "release_date": "1999-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-2709", "discovery_date": "2005-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617751" } ], "notes": [ { "category": "description", "text": "The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2709" }, { "category": "external", "summary": "RHBZ#1617751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2709", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709" } ], "release_date": "2005-11-08T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2973", "discovery_date": "2005-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617770" } ], "notes": [ { "category": "description", "text": "The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2973" }, { "category": "external", "summary": "RHBZ#1617770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2973", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2973" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2973", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2973" } ], "release_date": "2005-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3180", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617790" } ], "notes": [ { "category": "description", "text": "The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3180" }, { "category": "external", "summary": "RHBZ#1617790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617790" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3180", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3180" } ], "release_date": "2005-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3275", "discovery_date": "2005-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617812" } ], "notes": [ { "category": "description", "text": "The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3275" }, { "category": "external", "summary": "RHBZ#1617812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617812" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3275", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275" } ], "release_date": "2005-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3806", "discovery_date": "2005-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617840" } ], "notes": [ { "category": "description", "text": "The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3806" }, { "category": "external", "summary": "RHBZ#1617840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806" } ], "release_date": "2005-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:57:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0191" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2005_293
Vulnerability from csaf_redhat
Published
2005-04-22 20:17
Modified
2024-11-05 16:29
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 3 kernel are now available.
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
The Linux kernel handles the basic functions of the operating system.
Details
The following security issues were fixed:
The Vicam USB driver did not use the copy_from_user function to access
userspace, crossing security boundaries. (CAN-2004-0075)
The ext3 and jfs code did not properly initialize journal descriptor
blocks. A privileged local user could read portions of kernel memory.
(CAN-2004-0177)
The terminal layer did not properly lock line discipline changes or pending
IO. An unprivileged local user could read portions of kernel memory, or
cause a denial of service (system crash). (CAN-2004-0814)
A race condition was discovered. Local users could use this flaw to read
the environment variables of another process that is still spawning via
/proc/.../cmdline. (CAN-2004-1058)
A flaw in the execve() syscall handling was discovered, allowing a local
user to read setuid ELF binaries that should otherwise be protected by
standard permissions. (CAN-2004-1073). Red Hat originally reported this
as being fixed by RHSA-2004:549, but the associated fix was missing from
that update.
Keith Owens reported a flaw in the Itanium unw_unwind_to_user() function.
A local user could use this flaw to cause a denial of service (system
crash) on the Itanium architecture. (CAN-2005-0135)
A missing Itanium syscall table entry could allow an unprivileged
local user to cause a denial of service (system crash) on the Itanium
architecture. (CAN-2005-0137)
A flaw affecting the OUTS instruction on the AMD64 and Intel EM64T
architectures was discovered. A local user could use this flaw to
access privileged IO ports. (CAN-2005-0204)
A flaw was discovered in the Linux PPP driver. On systems allowing remote
users to connect to a server using ppp, a remote client could cause a
denial of service (system crash). (CAN-2005-0384)
A flaw in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 was
discovered that left a pointer to a freed tty structure. A local user
could potentially use this flaw to cause a denial of service (system crash)
or possibly gain read or write access to ttys that should normally be
prevented. (CAN-2005-0403)
A flaw in fragment queuing was discovered affecting the netfilter
subsystem. On systems configured to filter or process network packets (for
example those configured to do firewalling), a remote attacker could send a
carefully crafted set of fragmented packets to a machine and cause a denial
of service (system crash). In order to sucessfully exploit this flaw, the
attacker would need to know (or guess) some aspects of the firewall ruleset
in place on the target system to be able to craft the right fragmented
packets. (CAN-2005-0449)
Missing validation of an epoll_wait() system call parameter could allow
a local user to cause a denial of service (system crash) on the IBM S/390
and zSeries architectures. (CAN-2005-0736)
A flaw when freeing a pointer in load_elf_library was discovered. A local
user could potentially use this flaw to cause a denial of service (system
crash). (CAN-2005-0749)
A flaw was discovered in the bluetooth driver system. On system where the
bluetooth modules are loaded, a local user could use this flaw to gain
elevated (root) privileges. (CAN-2005-0750)
In addition to the security issues listed above, there was an important
fix made to the handling of the msync() system call for a particular case
in which the call could return without queuing modified mmap()'ed data for
file system update. (BZ 147969)
Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.
Red Hat Enterprise Linux 3 users are advised to upgrade their kernels to
the packages associated with their machine architectures/configurations
Please note that the fix for CAN-2005-0449 required changing the
external symbol linkages (kernel module ABI) for the ip_defrag()
and ip_ct_gather_frags() functions. Any third-party module using either
of these would also need to be fixed.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in the Red Hat\nEnterprise Linux 3 kernel are now available.\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.\n\nThe Linux kernel handles the basic functions of the operating system.", "title": "Topic" }, { "category": "general", "text": "The following security issues were fixed:\n\nThe Vicam USB driver did not use the copy_from_user function to access\nuserspace, crossing security boundaries. (CAN-2004-0075)\n\nThe ext3 and jfs code did not properly initialize journal descriptor\nblocks. A privileged local user could read portions of kernel memory.\n(CAN-2004-0177)\n\nThe terminal layer did not properly lock line discipline changes or pending\nIO. An unprivileged local user could read portions of kernel memory, or\ncause a denial of service (system crash). (CAN-2004-0814)\n\nA race condition was discovered. Local users could use this flaw to read\nthe environment variables of another process that is still spawning via\n/proc/.../cmdline. (CAN-2004-1058)\n\nA flaw in the execve() syscall handling was discovered, allowing a local\nuser to read setuid ELF binaries that should otherwise be protected by\nstandard permissions. (CAN-2004-1073). Red Hat originally reported this\nas being fixed by RHSA-2004:549, but the associated fix was missing from\nthat update.\n\nKeith Owens reported a flaw in the Itanium unw_unwind_to_user() function.\nA local user could use this flaw to cause a denial of service (system\ncrash) on the Itanium architecture. (CAN-2005-0135)\n\nA missing Itanium syscall table entry could allow an unprivileged\nlocal user to cause a denial of service (system crash) on the Itanium\narchitecture. (CAN-2005-0137)\n\nA flaw affecting the OUTS instruction on the AMD64 and Intel EM64T\narchitectures was discovered. A local user could use this flaw to\naccess privileged IO ports. (CAN-2005-0204)\n\nA flaw was discovered in the Linux PPP driver. On systems allowing remote\nusers to connect to a server using ppp, a remote client could cause a\ndenial of service (system crash). (CAN-2005-0384)\n\nA flaw in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 was\ndiscovered that left a pointer to a freed tty structure. A local user\ncould potentially use this flaw to cause a denial of service (system crash)\nor possibly gain read or write access to ttys that should normally be\nprevented. (CAN-2005-0403)\n\nA flaw in fragment queuing was discovered affecting the netfilter\nsubsystem. On systems configured to filter or process network packets (for\nexample those configured to do firewalling), a remote attacker could send a\ncarefully crafted set of fragmented packets to a machine and cause a denial\nof service (system crash). In order to sucessfully exploit this flaw, the\nattacker would need to know (or guess) some aspects of the firewall ruleset\nin place on the target system to be able to craft the right fragmented\npackets. (CAN-2005-0449)\n\nMissing validation of an epoll_wait() system call parameter could allow\na local user to cause a denial of service (system crash) on the IBM S/390\nand zSeries architectures. (CAN-2005-0736)\n\nA flaw when freeing a pointer in load_elf_library was discovered. A local\nuser could potentially use this flaw to cause a denial of service (system\ncrash). (CAN-2005-0749)\n\nA flaw was discovered in the bluetooth driver system. On system where the\nbluetooth modules are loaded, a local user could use this flaw to gain\nelevated (root) privileges. (CAN-2005-0750)\n\nIn addition to the security issues listed above, there was an important\nfix made to the handling of the msync() system call for a particular case\nin which the call could return without queuing modified mmap()\u0027ed data for\nfile system update. (BZ 147969)\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nRed Hat Enterprise Linux 3 users are advised to upgrade their kernels to\nthe packages associated with their machine architectures/configurations\n\nPlease note that the fix for CAN-2005-0449 required changing the\nexternal symbol linkages (kernel module ABI) for the ip_defrag()\nand ip_ct_gather_frags() functions. Any third-party module using either\nof these would also need to be fixed.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:293", "url": "https://access.redhat.com/errata/RHSA-2005:293" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "121032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121032" }, { "category": "external", "summary": "126407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=126407" }, { "category": "external", "summary": "130774", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130774" }, { "category": "external", "summary": "131674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131674" }, { "category": "external", "summary": "133108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=133108" }, { "category": "external", "summary": "133113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=133113" }, { "category": "external", "summary": "144059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144059" }, { "category": "external", "summary": "144530", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144530" }, { "category": "external", "summary": "147969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147969" }, { "category": "external", "summary": "148855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=148855" }, { "category": "external", "summary": "148869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=148869" }, { "category": "external", "summary": "150334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150334" }, { "category": "external", "summary": "151086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151086" }, { "category": "external", "summary": "151241", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151241" }, { "category": "external", "summary": "151805", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151805" }, { "category": "external", "summary": "152178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152178" }, { "category": "external", "summary": "152411", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152411" }, { "category": "external", "summary": "152552", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152552" }, { "category": "external", "summary": "155234", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155234" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_293.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-05T16:29:06+00:00", "generator": { "date": "2024-11-05T16:29:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2005:293", "initial_release_date": "2005-04-22T20:17:00+00:00", "revision_history": [ { "date": "2005-04-22T20:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-04-22T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:29:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.4.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-27.0.4.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.4.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.4.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.i386", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-27.0.4.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.src", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.src", "product_id": "kernel-0:2.4.21-27.0.4.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.ia32e", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e", "product_id": "kernel-0:2.4.21-27.0.4.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.4.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.4.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.4.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.4.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "product_id": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.4.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.4.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0075", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617137" } ], "notes": [ { "category": "description", "text": "The Vicam USB driver in Linux before 2.4.25 does not use the copy_from_user function when copying data from userspace to kernel space, which crosses security boundaries and allows local users to cause a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0075" }, { "category": "external", "summary": "RHBZ#1617137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617137" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0075", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0075" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0075", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0075" } ], "release_date": "2004-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-0177", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617168" } ], "notes": [ { "category": "description", "text": "The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0177" }, { "category": "external", "summary": "RHBZ#1617168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0177", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0177" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0177" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-0814", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617302" } ], "notes": [ { "category": "description", "text": "Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0814" }, { "category": "external", "summary": "RHBZ#1617302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617302" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0814", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0814" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0814", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0814" } ], "release_date": "2004-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1058", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617360" } ], "notes": [ { "category": "description", "text": "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1058" }, { "category": "external", "summary": "RHBZ#1617360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1058", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058" } ], "release_date": "2004-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0135", "discovery_date": "2005-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617465" } ], "notes": [ { "category": "description", "text": "The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0135" }, { "category": "external", "summary": "RHBZ#1617465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617465" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0135", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0135" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0135", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0135" } ], "release_date": "2005-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0137", "discovery_date": "2005-02-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617467" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6 on Itanium (ia64) architectures allows local users to cause a denial of service via a \"missing Itanium syscall table entry.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0137" }, { "category": "external", "summary": "RHBZ#1617467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617467" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0137", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0137" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0137", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0137" } ], "release_date": "2005-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0204", "discovery_date": "2005-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617491" } ], "notes": [ { "category": "description", "text": "Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0204" }, { "category": "external", "summary": "RHBZ#1617491", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617491" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0204", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0204" } ], "release_date": "2005-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0384", "discovery_date": "2005-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617513" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the PPP driver for the Linux kernel 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) via a pppd client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0384" }, { "category": "external", "summary": "RHBZ#1617513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617513" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0384", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0384" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0384", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0384" } ], "release_date": "2005-03-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0403", "discovery_date": "2004-09-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617522" } ], "notes": [ { "category": "description", "text": "init_dev in tty_io.c in the Red Hat backport of NPTL to Red Hat Enterprise Linux 3 does not properly clear controlling tty\u0027s in multi-threaded applications, which allows local users to cause a denial of service (crash) and possibly gain tty access via unknown attack vectors that trigger an access of a pointer to a freed structure.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0403" }, { "category": "external", "summary": "RHBZ#1617522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0403", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0403" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0403", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0403" } ], "release_date": "2005-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0449", "discovery_date": "2005-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617525" } ], "notes": [ { "category": "description", "text": "The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0449" }, { "category": "external", "summary": "RHBZ#1617525", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617525" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0449", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0449" } ], "release_date": "2005-01-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0736", "discovery_date": "2005-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617564" } ], "notes": [ { "category": "description", "text": "Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0736" }, { "category": "external", "summary": "RHBZ#1617564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0736", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0736" } ], "release_date": "2005-03-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0749", "discovery_date": "2005-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617566" } ], "notes": [ { "category": "description", "text": "The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0749" }, { "category": "external", "summary": "RHBZ#1617566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617566" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0749", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0749" } ], "release_date": "2005-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0750", "discovery_date": "2005-03-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617567" } ], "notes": [ { "category": "description", "text": "The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0750" }, { "category": "external", "summary": "RHBZ#1617567", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617567" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0750", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0750" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0750", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0750" } ], "release_date": "2005-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-04-22T20:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-0:2.4.21-27.0.4.EL.src", "3AS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.4.EL.src", "3Desktop:kernel-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-0:2.4.21-27.0.4.EL.src", "3ES:kernel-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-0:2.4.21-27.0.4.EL.src", "3WS:kernel-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.4.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.4.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:293" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
ghsa-g2v4-66wh-fj69
Vulnerability from github
Published
2022-04-29 02:58
Modified
2022-04-29 02:58
Details
The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
{ "affected": [], "aliases": [ "CVE-2004-1073" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-01-10T05:00:00Z", "severity": "LOW" }, "details": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "id": "GHSA-g2v4-66wh-fj69", "modified": "2022-04-29T02:58:54Z", "published": "2022-04-29T02:58:54Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" }, { "type": "WEB", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18025" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503" }, { "type": "WEB", "url": "http://secunia.com/advisories/18684" }, { "type": "WEB", "url": "http://secunia.com/advisories/20162" }, { "type": "WEB", "url": "http://secunia.com/advisories/20163" }, { "type": "WEB", "url": "http://secunia.com/advisories/20202" }, { "type": "WEB", "url": "http://secunia.com/advisories/20338" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "type": "WEB", "url": "http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2004-549.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0191.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/11646" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2004-1073
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2004-1073", "description": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "id": "GSD-2004-1073", "references": [ "https://www.suse.com/security/cve/CVE-2004-1073.html", "https://www.debian.org/security/2006/dsa-1082", "https://www.debian.org/security/2006/dsa-1070", "https://www.debian.org/security/2006/dsa-1067", "https://www.debian.org/security/2006/dsa-1069", "https://access.redhat.com/errata/RHSA-2006:0191", "https://access.redhat.com/errata/RHSA-2006:0190", "https://access.redhat.com/errata/RHSA-2005:293", "https://access.redhat.com/errata/RHSA-2004:549", "https://access.redhat.com/errata/RHSA-2004:505", "https://access.redhat.com/errata/RHSA-2004:504" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-1073" ], "details": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "id": "GSD-2004-1073", "modified": "2023-12-13T01:22:56.585045Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1073", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "18684", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18684" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt", "refsource": "MISC", "url": "http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt" }, { "name": "FLSA:2336", "refsource": "FEDORA", "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "20162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20162" }, { "name": "linux-elf-setuid-gain-privileges(18025)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18025" }, { "name": "RHSA-2006:0190", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "name": "RHSA-2004:549", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-549.html" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "11646", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11646" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "RHSA-2005:293", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "RHSA-2004:505", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "RHSA-2004:504", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "oval:org.mitre.oval:def:11503", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503" }, { "name": "RHSA-2006:0191", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0191.html" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1073" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2004:549", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2004-549.html" }, { "name": "http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt", "refsource": "MISC", "tags": [], "url": "http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt" }, { "name": "RHSA-2006:0190", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "name": "RHSA-2006:0191", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0191.html" }, { "name": "18684", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18684" }, { "name": "RHSA-2005:293", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-293.html" }, { "name": "DSA-1070", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "DSA-1067", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "20162", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20162" }, { "name": "20163", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20163" }, { "name": "RHSA-2004:504", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-504.html" }, { "name": "RHSA-2004:505", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2004-505.html" }, { "name": "11646", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/11646" }, { "name": "20202", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20202" }, { "name": "DSA-1082", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "20338", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20338" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "FLSA:2336", "refsource": "FEDORA", "tags": [], "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2336" }, { "name": "linux-elf-setuid-gain-privileges(18025)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18025" }, { "name": "oval:org.mitre.oval:def:11503", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11503" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:29Z", "publishedDate": "2005-01-10T05:00Z" } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.