Action not permitted
Modal body text goes here.
cve-2005-0003
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:57:40.741Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20163" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "SUSE-SA:2005:018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "name": "RHSA-2005:017", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.bkbits.net:8080/linux-2.4/cset%4041c36fb6q1Z68WUzKQFjJR-40Ev3tw" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "linux-vma-gain-privileges(18886)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18886" }, { "name": "RHSA-2005:043", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "2005-0001", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX", "x_transferred" ], "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "12261", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12261" }, { "name": "oval:org.mitre.oval:def:9512", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "1012885", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1012885" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://linux.bkbits.net:8080/linux-2.6/cset%4041a6721cce-LoPqkzKXudYby_3TUmg" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20338" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-01-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20163", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20163" }, { "name": "DSA-1082", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "SUSE-SA:2005:018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "name": "RHSA-2005:017", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.bkbits.net:8080/linux-2.4/cset%4041c36fb6q1Z68WUzKQFjJR-40Ev3tw" }, { "name": "DSA-1070", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "linux-vma-gain-privileges(18886)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18886" }, { "name": "RHSA-2005:043", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "2005-0001", "tags": [ "vendor-advisory", "x_refsource_TRUSTIX" ], "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "12261", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12261" }, { "name": "oval:org.mitre.oval:def:9512", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512" }, { "name": "DSA-1067", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "1012885", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1012885" }, { "tags": [ "x_refsource_MISC" ], "url": "http://linux.bkbits.net:8080/linux-2.6/cset%4041a6721cce-LoPqkzKXudYby_3TUmg" }, { "name": "20202", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20338" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "SUSE-SA:2005:018", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "name": "RHSA-2005:017", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "http://linux.bkbits.net:8080/linux-2.4/cset@41c36fb6q1Z68WUzKQFjJR-40Ev3tw", "refsource": "CONFIRM", "url": "http://linux.bkbits.net:8080/linux-2.4/cset@41c36fb6q1Z68WUzKQFjJR-40Ev3tw" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "linux-vma-gain-privileges(18886)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18886" }, { "name": "RHSA-2005:043", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "2005-0001", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "12261", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12261" }, { "name": "oval:org.mitre.oval:def:9512", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "1012885", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012885" }, { "name": "http://linux.bkbits.net:8080/linux-2.6/cset@41a6721cce-LoPqkzKXudYby_3TUmg", "refsource": "MISC", "url": "http://linux.bkbits.net:8080/linux-2.6/cset@41a6721cce-LoPqkzKXudYby_3TUmg" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-0003", "datePublished": "2005-01-20T05:00:00", "dateReserved": "2005-01-03T00:00:00", "dateUpdated": "2024-08-07T20:57:40.741Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-0003\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-04-14T04:00:00.000\",\"lastModified\":\"2023-11-07T01:57:08.470\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.\"},{\"lang\":\"es\",\"value\":\"El soporte de ELF de 64 bits en los kernel de Linux 2.6 anteriores a 2.6.10 en arquitecturas de 64 bits no verifica adecuadamente solapamientos en asignaciones de memoria VMA (virtual memory address), lo que permite a usuarios locales causar una denegaci\u00f3n de servicio (ca\u00edda del sistema) o ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero ELF o a.out artesanal.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":2.1},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D073442B-D7E7-4E07-AF2D-E22FE65B09A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:network_routing:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E942E0E7-0808-479C-B061-66119EBA12E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E586558A-ABC3-42EB-8B4D-DC92A0D695E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8710:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68B1272B-8B71-4D2D-A5E4-0E7828500C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8710:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7C7B9C0-91A2-4529-B879-60DE043E719C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25F5CF2-F891-41CA-A40C-13966F72FDF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7417958C-5321-41D6-9D1A-D16BF5511E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E244C37-E366-482E-9173-9376D0839839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"11F96BB9-6509-4F1E-9590-E55EE8C6F992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*\",\"matchCriteriaId\":\"12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"718D4631-440E-4783-8966-B2A2D3EF89B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6111EDDB-065F-4AD1-925C-E0A3C1DE26AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A2F7E7-0C51-43F2-BCEA-01FF738971D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"7015F57A-1E3B-42D2-9D12-F695078EFB21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"467721EE-5130-46C5-BBB7-0F4878F3F171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"171257E7-12C5-4283-88F7-FFE643995563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"0887E02F-9F36-41F0-9F75-060B8414D7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F49A384-7222-41F3-9BE1-4E18C00E50A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05520FE3-C48D-42E8-BC24-C2396BD46CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D865FBB6-E07D-492F-A75E-168B06C8ADEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F24C2-0366-4799-865C-5EE4572B734B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0399660-6385-45AB-9785-E504D8788146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCBC50EA-130C-41B7-83EA-C523B3C3AAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91F6CBE-400F-4D0B-B893-34577B47A342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1548ECFD-FCB5-4AE0-9788-42F61F25489F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABB9787-5497-4BDC-8952-F99CF60A89BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615F6BA2-CD51-4159-B28A-A018CA9FC25C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093848CB-68A1-4258-8357-373A477FE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E275F440-A427-465F-B314-BF0730C781DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98651D39-60CF-409F-8276-DBBB56B972AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067B8E09-C923-4DDA-92DB-4A2892CB526A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBE3738-E530-4EC6-9FC6-1A063605BE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"D77F8919-4064-4EA5-A948-76178EA21F83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E7C423D-23DE-4C7B-A518-66F87E041925\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EA1382E-71B0-4E65-A310-716A244F4FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"824BBD31-8F3B-4F05-981B-ABF662BBF5F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*\",\"matchCriteriaId\":\"388A5C99-1F60-4C20-9AE5-6E73E5A3F819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F677E992-8D37-438F-97DF-9D98B28F020C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5888F8D7-15C2-4435-BB3C-8674DFAF0089\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"29439AD0-EB8D-4675-A77A-6548FF27ADA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F27AADF6-1605-47FC-8C4D-87827A578A90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B42F4080-A76F-4D17-85E2-CD2D2E4D0450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"6968EF1D-7CC5-430D-866D-206F66486F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E6F5C5-BF74-4C10-830A-F232D528D290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476687F9-722B-490C-BD0B-B5F2CD7891DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A399D94B-D08D-4454-A07A-6634C9AE612F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCD8E4AE-FEF7-4CE2-B338-4F766921593F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*\",\"matchCriteriaId\":\"13A8B50A-73F6-4FCF-A81F-FB624FBA7143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9336ABDF-9928-49F6-BAA7-D6E9829F9B1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D27D843-2DA7-4481-857C-09FDC4FBD45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB93128-2743-4668-8C48-9B7282D4A672\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"040991B8-FB4B-480B-B53B-AA7A884F9F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFA592BC-5846-4FC1-B2A7-13E622705DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59688C40-C92F-431E-ADD7-6782622862D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5FE15BF-91C7-452A-BE1B-7EC9632421C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*\",\"matchCriteriaId\":\"15C1923C-D9C4-400D-9F0F-20B519EEC9C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51913F9-FC7D-450A-9A82-5084AA74A5B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B62E02D5-9EEE-439B-A510-BEEE28A9F358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*\",\"matchCriteriaId\":\"02278C07-E649-427D-9E5C-F1738A01BCBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E120257D-346B-4BA6-A431-E6F820FBB5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F83D55B-3106-4907-A75F-A7EBF0EC6974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AFD594E-48BA-4281-8DEE-306E3008ABB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4177C378-7729-46AB-B49B-C6DAED3200E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*\",\"matchCriteriaId\":\"A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3528DABD-B821-4D23-AE12-614A9CA92C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"9E661D58-18DF-4CCF-9892-F873618F4535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0F0D201-B1DC-4024-AF77-A284673618F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*\",\"matchCriteriaId\":\"052E3862-BFB7-42E7-889D-8590AFA8EF37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BB0B27C-04EA-426F-9016-7406BACD91DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*\",\"matchCriteriaId\":\"81B543F9-C209-46C2-B0AE-E14818A6992E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*\",\"matchCriteriaId\":\"EC79FF22-2664-4C40-B0B3-6D23B5F45162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*\",\"matchCriteriaId\":\"DB89C970-DE94-4E09-A90A-077DB83AD156\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3BBBC3-3EF9-4E24-9DE2-627E172A5473\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*\",\"matchCriteriaId\":\"C1A3B951-A1F8-4291-82FA-AB7922D13ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F3F3BB-E004-4FD9-9580-F2D5F3ED3701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20C0BD87-CE4B-49D2-89BE-EF282C43AD72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E6C4A8-59F4-43EE-8413-E95289037598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE76357A-27E6-4D85-9AA0-1BB658C41568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C56C5FDB-24E2-479D-87CA-164CD28567D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEF6C16F-8EDF-4A24-BFEF-6A304D654EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D982AE39-BB57-49E7-B5FE-5EF1ADE2F019\"}]}]}],\"references\":[{\"url\":\"http://linux.bkbits.net:8080/linux-2.4/cset%4041c36fb6q1Z68WUzKQFjJR-40Ev3tw\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://linux.bkbits.net:8080/linux-2.6/cset%4041a6721cce-LoPqkzKXudYby_3TUmg\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20163\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20202\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/20338\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1012885\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1067\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1069\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1070\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2006/dsa-1082\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:022\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_18_kernel.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-017.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-043.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/12261\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.trustix.org/errata/2005/0001/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/18886\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512\",\"source\":\"cve@mitre.org\"}]}}" } }
ghsa-hhhf-rv92-pq4q
Vulnerability from github
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.
{ "affected": [], "aliases": [ "CVE-2005-0003" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-04-14T04:00:00Z", "severity": "LOW" }, "details": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.", "id": "GHSA-hhhf-rv92-pq4q", "modified": "2022-05-01T01:46:48Z", "published": "2022-05-01T01:46:48Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18886" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512" }, { "type": "WEB", "url": "http://linux.bkbits.net:8080/linux-2.4/cset@41c36fb6q1Z68WUzKQFjJR-40Ev3tw" }, { "type": "WEB", "url": "http://linux.bkbits.net:8080/linux-2.6/cset@41a6721cce-LoPqkzKXudYby_3TUmg" }, { "type": "WEB", "url": "http://secunia.com/advisories/20163" }, { "type": "WEB", "url": "http://secunia.com/advisories/20202" }, { "type": "WEB", "url": "http://secunia.com/advisories/20338" }, { "type": "WEB", "url": "http://securitytracker.com/id?1012885" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "type": "WEB", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/12261" }, { "type": "WEB", "url": "http://www.trustix.org/errata/2005/0001" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2005_017
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 2.1 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for the following security issues:\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1235 to\nthis issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0001 to this issue.\n\nA flaw was discovered where an executable could cause a VMA overlap leading\nto a crash. On Itanium systems, a local user could trigger this flaw by\ncreating a carefully crafted ELF binary. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2005-0003 to\nthis issue.\n\niSEC Security Research and Georgi Guninski independently discovered a flaw\nin the scm_send function in the auxiliary message layer. A local user\ncould create a carefully crafted auxiliary message which could cause a\ndenial of service (system hang). The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2004-1016 to this issue.\n\nKirill Korotaev found a flaw in load_elf_binary affecting kernels prior to\n2.4.26. A local user could create a carefully crafted binary in such a\nway that it would cause a denial of service (system crash). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nname CAN-2004-1234 to this issue.\n\nThese packages also fix issues in the io_edgeport driver (CAN-2004-1017), a\nmemory leak in ip_options_get (CAN-2004-1335), and missing VM_IO\nflags in some drivers (CAN-2004-1057).\n\nOlaf Kirch discovered that the recent security fixes for cmsg_len handling\n(CAN-2004-1016) broke 32-bit compatibility on 64-bit platforms. A patch to\ncorrect this issue is included.\n\nA recent Internet Draft by Fernando Gont recommended that ICMP Source\nQuench messages be ignored by hosts. A patch to ignore these messages is\nincluded.\n\nAll Red Hat Enterprise Linux 2.1 users running Itanium are advised to\nupgrade their kernels to the packages listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:017", "url": "https://access.redhat.com/errata/RHSA-2005:017" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?m=109503896031720", "url": "http://marc.theaimsgroup.com/?m=109503896031720" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "137822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137822" }, { "category": "external", "summary": "142596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142596" }, { "category": "external", "summary": "142731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142731" }, { "category": "external", "summary": "142735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142735" }, { "category": "external", "summary": "143379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=143379" }, { "category": "external", "summary": "144108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144108" }, { "category": "external", "summary": "144138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144138" }, { "category": "external", "summary": "144408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144408" }, { "category": "external", "summary": "144785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144785" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_017.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-05T16:26:26+00:00", "generator": { "date": "2024-11-05T16:26:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2005:017", "initial_release_date": "2005-01-21T15:41:00+00:00", "revision_history": [ { "date": "2005-01-21T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-01-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:26:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0791", "discovery_date": "2004-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617291" } ], "notes": [ { "category": "description", "text": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0791" }, { "category": "external", "summary": "RHBZ#1617291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791" } ], "release_date": "2005-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1016", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617350" } ], "notes": [ { "category": "description", "text": "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1016" }, { "category": "external", "summary": "RHBZ#1617350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1017", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617351" } ], "notes": [ { "category": "description", "text": "Multiple \"overflows\" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1017" }, { "category": "external", "summary": "RHBZ#1617351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617351" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017" } ], "release_date": "2004-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1057", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617359" } ], "notes": [ { "category": "description", "text": "Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1057" }, { "category": "external", "summary": "RHBZ#1617359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1057", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1234", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617396" } ], "notes": [ { "category": "description", "text": "load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1234" }, { "category": "external", "summary": "RHBZ#1617396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617396" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1234", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234" } ], "release_date": "2004-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1335", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617408" } ], "notes": [ { "category": "description", "text": "Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1335" }, { "category": "external", "summary": "RHBZ#1617408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617408" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1335", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0001", "discovery_date": "2005-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617429" } ], "notes": [ { "category": "description", "text": "Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0001" }, { "category": "external", "summary": "RHBZ#1617429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001" } ], "release_date": "2005-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0003", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617430" } ], "notes": [ { "category": "description", "text": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0003" }, { "category": "external", "summary": "RHBZ#1617430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003" } ], "release_date": "2004-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "title": "security flaw" } ] }
rhsa-2005_043
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 3 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for several security issues:\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1235 to\nthis issue.\n\nA flaw was discovered where an executable could cause a VMA overlap leading\nto a crash. A local user could trigger this flaw by creating a carefully\ncrafted a.out binary on 32-bit systems or a carefully crafted ELF binary\non Itanium systems. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0003 to this issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0001 to this issue. A patch\nthat coincidentally fixed this issue was committed to the Update 4 kernel\nrelease in December 2004. Therefore Red Hat Enterprise Linux 3 kernels\nprovided by RHBA-2004:550 and subsequent updates are not vulnerable to\nthis issue.\n\nA flaw in the system call filtering code in the audit subsystem included\nin Red Hat Enterprise Linux 3 allowed a local user to cause a crash when\nauditing was enabled. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-1237 to this issue.\n\nOlaf Kirch discovered that the recent security fixes for cmsg_len handling\n(CAN-2004-1016) broke 32-bit compatibility on 64-bit platforms such as\nAMD64 and Intel EM64T. A patch to correct this issue is included.\n\nA recent Internet Draft by Fernando Gont recommended that ICMP Source\nQuench messages be ignored by hosts. A patch to ignore these messages is\nincluded.\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:043", "url": "https://access.redhat.com/errata/RHSA-2005:043" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?m=109503896031720", "url": "http://marc.theaimsgroup.com/?m=109503896031720" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "132245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=132245" }, { "category": "external", "summary": "141996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=141996" }, { "category": "external", "summary": "142091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142091" }, { "category": "external", "summary": "142442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142442" }, { "category": "external", "summary": "143866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=143866" }, { "category": "external", "summary": "144048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144048" }, { "category": "external", "summary": "144134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144134" }, { "category": "external", "summary": "144784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144784" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_043.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-05T16:26:50+00:00", "generator": { "date": "2024-11-05T16:26:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2005:043", "initial_release_date": "2005-01-18T23:52:00+00:00", "revision_history": [ { "date": "2005-01-18T23:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-01-18T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:26:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.2.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.2.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-27.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.2.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ia32e", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e", "product_id": "kernel-0:2.4.21-27.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.src", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.src", "product_id": "kernel-0:2.4.21-27.0.2.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0791", "discovery_date": "2004-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617291" } ], "notes": [ { "category": "description", "text": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0791" }, { "category": "external", "summary": "RHBZ#1617291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791" } ], "release_date": "2005-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1074", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617367" } ], "notes": [ { "category": "description", "text": "The binfmt functionality in the Linux kernel, when \"memory overcommit\" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1074" }, { "category": "external", "summary": "RHBZ#1617367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617367" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1074", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1074" } ], "release_date": "2004-11-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1237", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617399" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1237" }, { "category": "external", "summary": "RHBZ#1617399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1237", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1237" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1237", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1237" } ], "release_date": "2004-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0003", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617430" } ], "notes": [ { "category": "description", "text": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0003" }, { "category": "external", "summary": "RHBZ#1617430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003" } ], "release_date": "2004-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "title": "security flaw" } ] }
var-200501-0468
Vulnerability from variot
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file. Linux Kernel is reported prone to a local denial-of-service vulnerability. Reportedly, this issue presents itself when a user creates a large Virtual Memory Area (VMA) that overlaps with arg pages during the exec() system call. Successful exploitation will lead to a denial-of-service condition in a vulnerable computer. No further details are available at this time. This issue will be updated as more information becomes available. Linux Kernel is the kernel of the open source operating system Linux.
Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.
http://secunia.com/secunia_security_specialist/
TITLE: Debian update for kernel-source-2.4.17
SECUNIA ADVISORY ID: SA20338
VERIFY ADVISORY: http://secunia.com/advisories/20338/
CRITICAL: Moderately critical
IMPACT: Exposure of system information, Exposure of sensitive information, Privilege escalation, DoS, System access
WHERE:
From remote
OPERATING SYSTEM: Debian GNU/Linux 3.0 http://secunia.com/product/143/
DESCRIPTION: Debian has issued an update for kernel-source-2.4.17. This fixes some vulnerabilities, which can be exploited by malicious, local users to gain knowledge of sensitive information, cause a DoS (Denial of Service), gain escalated privileges, and by malicious people to cause a DoS, and disclose potentially sensitive information.
-- Debian GNU/Linux 3.0 alias woody --
Source archives:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc Size/MD5 checksum: 713 6ff55b14d3ae957c55bbed7fabf4c047 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz Size/MD5 checksum: 30437486 86601103169da686167972e5e560e3d4 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc Size/MD5 checksum: 736 f97d95c6ecc26401f8f2fc2ead6cf421 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz Size/MD5 checksum: 25419305 9bc354f889edd4964840475400b088b7 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc Size/MD5 checksum: 800 d20db4ab99e311150734b70519cc31e9 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz Size/MD5 checksum: 12283 f51a7e01941baca7010fb8c2f0f67fe3 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc Size/MD5 checksum: 694 2d48f4cfa4917904b6c1f806ecc1bdb4 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz Size/MD5 checksum: 491935 94638c0c03b6b163f46319e777d4aa71 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc Size/MD5 checksum: 805 b48cbc9c2cd59eee3a52f54cfa5356e0 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz Size/MD5 checksum: 1150966 6748462e7bce7c917e066e0594d42571 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc Size/MD5 checksum: 664 f49e9cba55a8a4b098e5dc522f2a07fc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz Size/MD5 checksum: 344642 3a488cc38ffc619bfff4bfbb75eff4cd http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc Size/MD5 checksum: 609 4e0f66c1811cfb9e926c21566e55b202 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz Size/MD5 checksum: 29768549 bc1f8eab880a33bfe2ebeb3ef8b6557a
Architecture independent components:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb Size/MD5 checksum: 24455128 ed5362b12c6327295cd89027ff8e80ab http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb Size/MD5 checksum: 24735538 cf9ddb702811464ac2dd2231512053f9 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb Size/MD5 checksum: 1151866 6f2575f26e7800e1e7a7cafdaf02b3a6 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb Size/MD5 checksum: 300202 0f5db53cdab20024b4a3a75bd0799b1a http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb Size/MD5 checksum: 1708122 7d18878351662289ac0841e0ad8f10f4 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb Size/MD5 checksum: 23972270 a0bf4a2796a9b49c36579166e6a72d62
HP Precision architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb Size/MD5 checksum: 3523044 63c790a70164e579c8bb3b8a08ea69b5 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb Size/MD5 checksum: 2869994 e9e2be22d5fdf40f2e879570adc1132d http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb Size/MD5 checksum: 3006192 cf53ac718c6ed26a59802e74c5926f00 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb Size/MD5 checksum: 3029436 d0e0fd747af9ff7a3633ee9cc6b1f1e6 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb Size/MD5 checksum: 3170356 ca408698a580463da3a547b2f87006e4 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb Size/MD5 checksum: 16886 437018078d9d01e25702cf1a20c23414
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb Size/MD5 checksum: 3638280 b6cd4e0d4129b6f4d0734253818cd828 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb Size/MD5 checksum: 7026800 55e4cd610c06297c7132ce2aeb88d029 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb Size/MD5 checksum: 7172892 a66f94c18d8ee4354e9446655837c72a http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb Size/MD5 checksum: 7014470 d99cc0f293c747a295230de934328007 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb Size/MD5 checksum: 7165570 997a9dbf17821067de6ceb65548e7c2b http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb Size/MD5 checksum: 21616 1eab80187061fbd304b6328533d7dc33
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb Size/MD5 checksum: 3379418 74817217abf90896eb63d6c6792839fe http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb Size/MD5 checksum: 1346190 39433c757763336b6c14bf0d00652596 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb Size/MD5 checksum: 16404 9cfcf10a2a2ef99bbb009a650cddd227
PowerPC architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb Size/MD5 checksum: 3409712 698750e3998ee3792db43f445a8a8d96 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb Size/MD5 checksum: 2211146 103890e43508a5913a10ff8be80e9cdc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb Size/MD5 checksum: 4602 31ef3f45675fc13836337dee97486e20 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb Size/MD5 checksum: 490842 799441a4e49b88f780353d7aff9f29d2 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb Size/MD5 checksum: 16280 4e54c040bc83523d8122287bab6df7a5
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb Size/MD5 checksum: 3523520 45f001c255a3a66f22148d84d035abb1 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb Size/MD5 checksum: 2045436 c840c6ff8c9e3ab455d38021d09a391d http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb Size/MD5 checksum: 2045226 709ccbc6754644fa448c93058f0df504 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb Size/MD5 checksum: 16556 019623b1dbc75bff84d7f056435dc6db
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb Size/MD5 checksum: 3522422 2118440d1658730fd93f47867848573c http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb Size/MD5 checksum: 2200968 63bc732deee6df19b83f10a50485a476 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb Size/MD5 checksum: 2195278 697eb9b05f765c332eca175284eb24b8 http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb Size/MD5 checksum: 17836 61df1f292dccb4e64cb956a629f729fc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb Size/MD5 checksum: 16558 f8382b01aca2c535988b5ab5709dae90
Alpha architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb Size/MD5 checksum: 17180 7d1cf8fb24431c01f45fadf7becb6d2e
ARM architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb Size/MD5 checksum: 15878 fcf97ed103c205699fb5396c3a49e293
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb Size/MD5 checksum: 15518 2e7d50090a469a84ef7f3ae8aa97b85f
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb Size/MD5 checksum: 15368 41a11620bf7ea34b15742ccf59ff6895
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb Size/MD5 checksum: 18356 71b076d3eeff837bfb54a7f538b11b58
ORIGINAL ADVISORY: http://www.us.debian.org/security/2006/dsa-1082
OTHER REFERENCES: SA10533: http://secunia.com/advisories/10533/
SA11464: http://secunia.com/advisories/11464/
SA11861: http://secunia.com/advisories/11861/
SA11943: http://secunia.com/advisories/11943/
SA13232: http://secunia.com/advisories/13232/
SA13469: http://secunia.com/advisories/13469/
SA13126: http://secunia.com/advisories/13126/
SA13308: http://secunia.com/advisories/13308/
SA13627: http://secunia.com/advisories/13627/
SA13756: http://secunia.com/advisories/13756/
SA13493: http://secunia.com/advisories/13493/
SA13822: http://secunia.com/advisories/13822/
SA14295: http://secunia.com/advisories/14295/
SA14570: http://secunia.com/advisories/14570/
SA13784: http://secunia.com/advisories/13784/
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200501-0468", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "avaya", "version": "r2.0.1" }, { "model": "s8700", "scope": "eq", "trust": 1.6, "vendor": "avaya", "version": "r2.0.0" }, { "model": "s8300", "scope": "eq", "trust": 1.6, "vendor": "avaya", "version": "r2.0.0" }, { "model": "s8500", "scope": "eq", "trust": 1.6, "vendor": "avaya", "version": "r2.0.0" }, { "model": "s8700", "scope": "eq", "trust": 1.6, "vendor": "avaya", "version": "r2.0.1" }, { "model": "s8300", "scope": "eq", "trust": 1.6, "vendor": "avaya", "version": "r2.0.1" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.28" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.26" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.25" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.22" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.20" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.17" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.16" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.15" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.14" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.13" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.12" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.11" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.10" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.9" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.8" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.7" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.6" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.5" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.4" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.3" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.2" }, { "model": "kernel", "scope": "eq", "trust": 1.3, "vendor": "linux", "version": "2.4.1" }, { "model": "converged communications server", "scope": "eq", "trust": 1.3, "vendor": "avaya", "version": "2.0" }, { "model": "s8710", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.1" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.1" }, { "model": "enterprise linux", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "mandrake linux corporate server", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "modular messaging message storage server", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "2.0" }, { "model": "mandrake multi network firewall", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "8.2" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.29" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.23_ow2" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "3.0" }, { "model": "s8710", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "r2.0.0" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "10.0" }, { "model": "network routing", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "mn100", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "modular messaging message storage server", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "1.1" }, { "model": "mandrake linux corporate server", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "mandrake linux", "scope": "eq", "trust": 1.0, "vendor": "mandrakesoft", "version": "9.2" }, { "model": "intuity audix", "scope": "eq", "trust": 1.0, "vendor": "avaya", "version": "*" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.24_ow1" }, { "model": "kernel", "scope": "eq", "trust": 1.0, "vendor": "linux", "version": "2.4.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3.0" }, { "model": "turbolinux server", "scope": "eq", "trust": 0.8, "vendor": "turbo linux", "version": "10" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.1" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "10.0" }, { "model": "linux mandrake amd64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "9.2" }, { "model": "multi network firewall", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.0" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "3.0" }, { "model": "corporate server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "corporate server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "2.1" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.29" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.29" }, { "model": "kernel -pre5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.27" }, { "model": "kernel -ow1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.24" }, { "model": "kernel -pre9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel -ow2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.23" }, { "model": "kernel pre7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.21" }, { "model": "kernel -pre6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel -pre1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.19" }, { "model": "kernel pre-8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel pre-1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4.18x86" }, { "model": "kernel .0-test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test12", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel .0-test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.4" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ppc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "3.0" }, { "model": "s8710 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8710 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8700 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8500 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.1", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "s8300 r2.0.0", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "network routing", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "2.0" }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "mn100", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null }, { "model": "intuity lx", "scope": null, "trust": 0.3, "vendor": "avaya", "version": null } ], "sources": [ { "db": "BID", "id": "12261" }, { "db": "JVNDB", "id": "JVNDB-2005-000023" }, { "db": "NVD", "id": "CVE-2005-0003" }, { "db": "CNNVD", "id": "CNNVD-200504-057" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8710:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:network_routing:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8710:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0003" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "This discoverer of this vulnerability is currently unknown.", "sources": [ { "db": "BID", "id": "12261" }, { "db": "CNNVD", "id": "CNNVD-200504-057" } ], "trust": 0.9 }, "cve": "CVE-2005-0003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2005-0003", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-11212", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2005-0003", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-200504-057", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-11212", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-11212" }, { "db": "JVNDB", "id": "JVNDB-2005-000023" }, { "db": "NVD", "id": "CVE-2005-0003" }, { "db": "CNNVD", "id": "CNNVD-200504-057" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file. Linux Kernel is reported prone to a local denial-of-service vulnerability. \nReportedly, this issue presents itself when a user creates a large Virtual Memory Area (VMA) that overlaps with arg pages during the exec() system call. \nSuccessful exploitation will lead to a denial-of-service condition in a vulnerable computer. \nNo further details are available at this time. This issue will be updated as more information becomes available. Linux Kernel is the kernel of the open source operating system Linux. \n\n----------------------------------------------------------------------\n\nWant to join the Secunia Security Team?\n\nSecunia offers a position as a security specialist, where your daily\nwork involves reverse engineering of software and exploit code,\nauditing of source code, and analysis of vulnerability reports. \n\nhttp://secunia.com/secunia_security_specialist/\n\n----------------------------------------------------------------------\n\nTITLE:\nDebian update for kernel-source-2.4.17\n\nSECUNIA ADVISORY ID:\nSA20338\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/20338/\n\nCRITICAL:\nModerately critical\n\nIMPACT:\nExposure of system information, Exposure of sensitive information,\nPrivilege escalation, DoS, System access\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nDebian GNU/Linux 3.0\nhttp://secunia.com/product/143/\n\nDESCRIPTION:\nDebian has issued an update for kernel-source-2.4.17. This fixes some\nvulnerabilities, which can be exploited by malicious, local users to\ngain knowledge of sensitive information, cause a DoS (Denial of\nService), gain escalated privileges, and by malicious people to cause\na DoS, and disclose potentially sensitive information. \n\n-- Debian GNU/Linux 3.0 alias woody --\n\nSource archives:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc\nSize/MD5 checksum: 713 6ff55b14d3ae957c55bbed7fabf4c047\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz\nSize/MD5 checksum: 30437486 86601103169da686167972e5e560e3d4\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc\nSize/MD5 checksum: 736 f97d95c6ecc26401f8f2fc2ead6cf421\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz\nSize/MD5 checksum: 25419305 9bc354f889edd4964840475400b088b7\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc\nSize/MD5 checksum: 800 d20db4ab99e311150734b70519cc31e9\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz\nSize/MD5 checksum: 12283 f51a7e01941baca7010fb8c2f0f67fe3\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc\nSize/MD5 checksum: 694 2d48f4cfa4917904b6c1f806ecc1bdb4\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz\nSize/MD5 checksum: 491935 94638c0c03b6b163f46319e777d4aa71\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc\nSize/MD5 checksum: 805 b48cbc9c2cd59eee3a52f54cfa5356e0\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz\nSize/MD5 checksum: 1150966 6748462e7bce7c917e066e0594d42571\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc\nSize/MD5 checksum: 664 f49e9cba55a8a4b098e5dc522f2a07fc\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz\nSize/MD5 checksum: 344642 3a488cc38ffc619bfff4bfbb75eff4cd\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc\nSize/MD5 checksum: 609 4e0f66c1811cfb9e926c21566e55b202\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz\nSize/MD5 checksum: 29768549 bc1f8eab880a33bfe2ebeb3ef8b6557a\n\nArchitecture independent components:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb\nSize/MD5 checksum: 24455128 ed5362b12c6327295cd89027ff8e80ab\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb\nSize/MD5 checksum: 24735538 cf9ddb702811464ac2dd2231512053f9\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb\nSize/MD5 checksum: 1151866 6f2575f26e7800e1e7a7cafdaf02b3a6\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb\nSize/MD5 checksum: 300202 0f5db53cdab20024b4a3a75bd0799b1a\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb\nSize/MD5 checksum: 1708122 7d18878351662289ac0841e0ad8f10f4\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb\nSize/MD5 checksum: 23972270 a0bf4a2796a9b49c36579166e6a72d62\n\nHP Precision architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb\nSize/MD5 checksum: 3523044 63c790a70164e579c8bb3b8a08ea69b5\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb\nSize/MD5 checksum: 2869994 e9e2be22d5fdf40f2e879570adc1132d\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb\nSize/MD5 checksum: 3006192 cf53ac718c6ed26a59802e74c5926f00\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb\nSize/MD5 checksum: 3029436 d0e0fd747af9ff7a3633ee9cc6b1f1e6\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb\nSize/MD5 checksum: 3170356 ca408698a580463da3a547b2f87006e4\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb\nSize/MD5 checksum: 16886 437018078d9d01e25702cf1a20c23414\n\nIntel IA-64 architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb\nSize/MD5 checksum: 3638280 b6cd4e0d4129b6f4d0734253818cd828\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb\nSize/MD5 checksum: 7026800 55e4cd610c06297c7132ce2aeb88d029\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb\nSize/MD5 checksum: 7172892 a66f94c18d8ee4354e9446655837c72a\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb\nSize/MD5 checksum: 7014470 d99cc0f293c747a295230de934328007\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb\nSize/MD5 checksum: 7165570 997a9dbf17821067de6ceb65548e7c2b\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb\nSize/MD5 checksum: 21616 1eab80187061fbd304b6328533d7dc33\n\nIBM S/390 architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb\nSize/MD5 checksum: 3379418 74817217abf90896eb63d6c6792839fe\nhttp://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb\nSize/MD5 checksum: 1346190 39433c757763336b6c14bf0d00652596\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb\nSize/MD5 checksum: 16404 9cfcf10a2a2ef99bbb009a650cddd227\n\nPowerPC architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb\nSize/MD5 checksum: 3409712 698750e3998ee3792db43f445a8a8d96\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb\nSize/MD5 checksum: 2211146 103890e43508a5913a10ff8be80e9cdc\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb\nSize/MD5 checksum: 4602 31ef3f45675fc13836337dee97486e20\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb\nSize/MD5 checksum: 490842 799441a4e49b88f780353d7aff9f29d2\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb\nSize/MD5 checksum: 16280 4e54c040bc83523d8122287bab6df7a5\n\nBig endian MIPS architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb\nSize/MD5 checksum: 3523520 45f001c255a3a66f22148d84d035abb1\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb\nSize/MD5 checksum: 2045436 c840c6ff8c9e3ab455d38021d09a391d\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb\nSize/MD5 checksum: 2045226 709ccbc6754644fa448c93058f0df504\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb\nSize/MD5 checksum: 16556 019623b1dbc75bff84d7f056435dc6db\n\nLittle endian MIPS architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb\nSize/MD5 checksum: 3522422 2118440d1658730fd93f47867848573c\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb\nSize/MD5 checksum: 2200968 63bc732deee6df19b83f10a50485a476\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb\nSize/MD5 checksum: 2195278 697eb9b05f765c332eca175284eb24b8\nhttp://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb\nSize/MD5 checksum: 17836 61df1f292dccb4e64cb956a629f729fc\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb\nSize/MD5 checksum: 16558 f8382b01aca2c535988b5ab5709dae90\n\nAlpha architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb\nSize/MD5 checksum: 17180 7d1cf8fb24431c01f45fadf7becb6d2e\n\nARM architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb\nSize/MD5 checksum: 15878 fcf97ed103c205699fb5396c3a49e293\n\nIntel IA-32 architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb\nSize/MD5 checksum: 15518 2e7d50090a469a84ef7f3ae8aa97b85f\n\nMotorola 680x0 architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb\nSize/MD5 checksum: 15368 41a11620bf7ea34b15742ccf59ff6895\n\nSun Sparc architecture:\n\nhttp://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb\nSize/MD5 checksum: 18356 71b076d3eeff837bfb54a7f538b11b58\n\nORIGINAL ADVISORY:\nhttp://www.us.debian.org/security/2006/dsa-1082\n\nOTHER REFERENCES:\nSA10533:\nhttp://secunia.com/advisories/10533/\n\nSA11464:\nhttp://secunia.com/advisories/11464/\n\nSA11861:\nhttp://secunia.com/advisories/11861/\n\nSA11943:\nhttp://secunia.com/advisories/11943/\n\nSA13232:\nhttp://secunia.com/advisories/13232/\n\nSA13469:\nhttp://secunia.com/advisories/13469/\n\nSA13126:\nhttp://secunia.com/advisories/13126/\n\nSA13308:\nhttp://secunia.com/advisories/13308/\n\nSA13627:\nhttp://secunia.com/advisories/13627/\n\nSA13756:\nhttp://secunia.com/advisories/13756/\n\nSA13493:\nhttp://secunia.com/advisories/13493/\n\nSA13822:\nhttp://secunia.com/advisories/13822/\n\nSA14295:\nhttp://secunia.com/advisories/14295/\n\nSA14570:\nhttp://secunia.com/advisories/14570/\n\nSA13784:\nhttp://secunia.com/advisories/13784/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2005-0003" }, { "db": "JVNDB", "id": "JVNDB-2005-000023" }, { "db": "BID", "id": "12261" }, { "db": "VULHUB", "id": "VHN-11212" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2005-0003", "trust": 2.8 }, { "db": "BID", "id": "12261", "trust": 2.8 }, { "db": "SECTRACK", "id": "1012885", "trust": 2.5 }, { "db": "SECUNIA", "id": "20202", "trust": 1.8 }, { "db": "SECUNIA", "id": "20338", "trust": 1.8 }, { "db": "SECUNIA", "id": "20163", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000023", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200504-057", "trust": 0.7 }, { "db": "REDHAT", "id": "RHSA-2005:043", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:017", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1069", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1067", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1070", "trust": 0.6 }, { "db": "DEBIAN", "id": "DSA-1082", "trust": 0.6 }, { "db": "MANDRAKE", "id": "MDKSA-2005:022", "trust": 0.6 }, { "db": "SUSE", "id": "SUSE-SA:2005:018", "trust": 0.6 }, { "db": "TRUSTIX", "id": "2005-0001", "trust": 0.6 }, { "db": "XF", "id": "18886", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-11212", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46873", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46534", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "46587", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-11212" }, { "db": "BID", "id": "12261" }, { "db": "JVNDB", "id": "JVNDB-2005-000023" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" }, { "db": "NVD", "id": "CVE-2005-0003" }, { "db": "CNNVD", "id": "CNNVD-200504-057" } ] }, "id": "VAR-200501-0468", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-11212" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:24:20.836000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "kernel_30", "trust": 0.8, "url": "http://www.miraclelinux.com/support/update/data/kernel_30.html" }, { "title": "RHSA-2005:017", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2005-017.html" }, { "title": "RHSA-2005:043", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2005-043.html" }, { "title": "TLSA-2005-29", "trust": 0.8, "url": "http://www.turbolinux.com/security/2005/tlsa-2005-29.txt" }, { "title": "RHSA-2005:017", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-017j.html" }, { "title": "RHSA-2005:043", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2005-043j.html" }, { "title": "TLSA-2005-29", "trust": 0.8, "url": "http://www.turbolinux.co.jp/security/2005/tlsa-2005-29j.txt" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000023" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2005-0003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.securityfocus.com/bid/12261" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1067" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1069" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1070" }, { "trust": 1.7, "url": "http://www.debian.org/security/2006/dsa-1082" }, { "trust": 1.7, "url": "http://www.mandriva.com/security/advisories?name=mdksa-2005:022" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2005-017.html" }, { "trust": 1.7, "url": "http://www.redhat.com/support/errata/rhsa-2005-043.html" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1012885" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20163" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20202" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20338" }, { "trust": 1.7, "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "trust": 1.7, "url": "http://www.trustix.org/errata/2005/0001/" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9512" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18886" }, { "trust": 1.0, "url": "http://linux.bkbits.net:8080/linux-2.4/cset%4041c36fb6q1z68wuzkqfjjr-40ev3tw" }, { "trust": 1.0, "url": "http://linux.bkbits.net:8080/linux-2.6/cset%4041a6721cce-lopqkzkxudyby_3tumg" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2005-0003" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2005-0003" }, { "trust": 0.8, "url": "http://www.securitytracker.com/alerts/2005/jan/1012885.html" }, { "trust": 0.7, "url": "http://linux.bkbits.net:8080/linux-2.4/cset@41c36fb6q1z68wuzkqfjjr-40ev3tw" }, { "trust": 0.7, "url": "http://linux.bkbits.net:8080/linux-2.6/cset@41a6721cce-lopqkzkxudyby_3tumg" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/18886" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2005-034_rhsa-2005-016rhsa-2006-017rhsa-2005-043.pdf" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-043.html" }, { "trust": 0.3, "url": "http://secunia.com/advisories/13232/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/13469/" }, { "trust": 0.3, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.3, "url": "http://secunia.com/advisories/13308/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/11464/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/13822/" }, { "trust": 0.3, "url": "http://secunia.com/product/143/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/10533/" }, { "trust": 0.3, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/13756/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/13126/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/11943/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/13627/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/13493/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/14570/" }, { "trust": 0.3, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/11861/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/13784/" }, { "trust": 0.3, "url": "http://secunia.com/advisories/14295/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_specialist/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20338/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb" }, { "trust": 0.1, "url": "http://www.us.debian.org/security/2006/dsa-1082" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz" }, { "trust": 0.1, "url": "http://www.us.debian.org/security/2006/dsa-1070" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20163/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.tar.gz" }, { "trust": 0.1, "url": "http://www.us.debian.org/security/2006/dsa-1069" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-headers-2.4.18_2.4.18-1woody6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-smp_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k6_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20202/" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-386_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686-smp_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k7_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18.orig.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-586tsc_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686-smp_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k7_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-smp_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-generic_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k6_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.diff.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-386_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-doc-2.4.18_2.4.18-14.4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-generic_2.4.18-15woody1_alpha.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k7_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-586tsc_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody6_powerpc.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k6_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.tar.gz" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-386_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4_all.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686_2.4.18-13.2_i386.deb" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.dsc" }, { "trust": 0.1, "url": "http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.tar.gz" } ], "sources": [ { "db": "VULHUB", "id": "VHN-11212" }, { "db": "BID", "id": "12261" }, { "db": "JVNDB", "id": "JVNDB-2005-000023" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" }, { "db": "NVD", "id": "CVE-2005-0003" }, { "db": "CNNVD", "id": "CNNVD-200504-057" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-11212" }, { "db": "BID", "id": "12261" }, { "db": "JVNDB", "id": "JVNDB-2005-000023" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" }, { "db": "NVD", "id": "CVE-2005-0003" }, { "db": "CNNVD", "id": "CNNVD-200504-057" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2005-04-14T00:00:00", "db": "VULHUB", "id": "VHN-11212" }, { "date": "2005-01-13T00:00:00", "db": "BID", "id": "12261" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000023" }, { "date": "2006-05-31T21:33:01", "db": "PACKETSTORM", "id": "46873" }, { "date": "2006-05-23T05:09:34", "db": "PACKETSTORM", "id": "46534" }, { "date": "2006-05-23T16:45:46", "db": "PACKETSTORM", "id": "46587" }, { "date": "2005-04-14T04:00:00", "db": "NVD", "id": "CVE-2005-0003" }, { "date": "2005-04-14T00:00:00", "db": "CNNVD", "id": "CNNVD-200504-057" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-10-11T00:00:00", "db": "VULHUB", "id": "VHN-11212" }, { "date": "2007-01-18T02:40:00", "db": "BID", "id": "12261" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000023" }, { "date": "2023-11-07T01:57:08.470000", "db": "NVD", "id": "CVE-2005-0003" }, { "date": "2006-11-30T00:00:00", "db": "CNNVD", "id": "CNNVD-200504-057" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "12261" }, { "db": "PACKETSTORM", "id": "46873" }, { "db": "PACKETSTORM", "id": "46534" }, { "db": "PACKETSTORM", "id": "46587" }, { "db": "CNNVD", "id": "CNNVD-200504-057" } ], "trust": 1.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux Kernel of exec.c Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000023" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200504-057" } ], "trust": 0.6 } }
gsd-2005-0003
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2005-0003", "description": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.", "id": "GSD-2005-0003", "references": [ "https://www.suse.com/security/cve/CVE-2005-0003.html", "https://www.debian.org/security/2006/dsa-1082", "https://www.debian.org/security/2006/dsa-1070", "https://www.debian.org/security/2006/dsa-1067", "https://www.debian.org/security/2006/dsa-1069", "https://access.redhat.com/errata/RHSA-2005:043", "https://access.redhat.com/errata/RHSA-2005:017" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-0003" ], "details": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.", "id": "GSD-2005-0003", "modified": "2023-12-13T01:20:09.036061Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20163", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20163" }, { "name": "DSA-1082", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "SUSE-SA:2005:018", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "name": "RHSA-2005:017", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "http://linux.bkbits.net:8080/linux-2.4/cset@41c36fb6q1Z68WUzKQFjJR-40Ev3tw", "refsource": "CONFIRM", "url": "http://linux.bkbits.net:8080/linux-2.4/cset@41c36fb6q1Z68WUzKQFjJR-40Ev3tw" }, { "name": "DSA-1070", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "linux-vma-gain-privileges(18886)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18886" }, { "name": "RHSA-2005:043", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "2005-0001", "refsource": "TRUSTIX", "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "12261", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12261" }, { "name": "oval:org.mitre.oval:def:9512", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512" }, { "name": "DSA-1067", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1069", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "1012885", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1012885" }, { "name": "http://linux.bkbits.net:8080/linux-2.6/cset@41a6721cce-LoPqkzKXudYby_3TUmg", "refsource": "MISC", "url": "http://linux.bkbits.net:8080/linux-2.6/cset@41a6721cce-LoPqkzKXudYby_3TUmg" }, { "name": "20202", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20338" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:avaya:mn100:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8710:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8710:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:avaya:modular_messaging_message_storage_server:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:avaya:network_routing:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-0003" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2005:043", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "12261", "refsource": "BID", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/12261" }, { "name": "http://linux.bkbits.net:8080/linux-2.4/cset@41c36fb6q1Z68WUzKQFjJR-40Ev3tw", "refsource": "CONFIRM", "tags": [], "url": "http://linux.bkbits.net:8080/linux-2.4/cset@41c36fb6q1Z68WUzKQFjJR-40Ev3tw" }, { "name": "SUSE-SA:2005:018", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "name": "2005-0001", "refsource": "TRUSTIX", "tags": [], "url": "http://www.trustix.org/errata/2005/0001/" }, { "name": "http://linux.bkbits.net:8080/linux-2.6/cset@41a6721cce-LoPqkzKXudYby_3TUmg", "refsource": "MISC", "tags": [], "url": "http://linux.bkbits.net:8080/linux-2.6/cset@41a6721cce-LoPqkzKXudYby_3TUmg" }, { "name": "1012885", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1012885" }, { "name": "RHSA-2005:017", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "20163", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20163" }, { "name": "20202", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20202" }, { "name": "20338", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/20338" }, { "name": "MDKSA-2005:022", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022" }, { "name": "DSA-1067", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1067" }, { "name": "DSA-1070", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1070" }, { "name": "DSA-1082", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1082" }, { "name": "DSA-1069", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2006/dsa-1069" }, { "name": "linux-vma-gain-privileges(18886)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18886" }, { "name": "oval:org.mitre.oval:def:9512", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9512" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:29Z", "publishedDate": "2005-04-14T04:00Z" } } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.