Action not permitted
Modal body text goes here.
cve-2005-3274
Vulnerability from cvelistv5
Published
2005-10-20 04:00
Modified
2024-10-15 14:15
Severity ?
EPSS score ?
Summary
Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:10:07.282Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDKSA-2005:235", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235" }, { "name": "18684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18684" }, { "name": "18056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18056" }, { "name": "18977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18977" }, { "name": "MDKSA-2005:220", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "name": "MDKSA-2006:044", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044" }, { "name": "15528", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15528" }, { "name": "DSA-922", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "FLSA:157459-4", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded" }, { "name": "USN-219-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/219-1/" }, { "name": "RHSA-2006:0190", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d" }, { "name": "MDKSA-2005:218", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "name": "17826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17826" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://lkml.org/lkml/2005/6/23/249" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://lkml.org/lkml/2005/6/24/173" }, { "name": "oval:org.mitre.oval:def:11723", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723" }, { "name": "FLSA:157459-3", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "RHSA-2005:663", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-663.html" }, { "name": "MDKSA-2005:219", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2005-3274", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-02T18:26:04.388396Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T14:15:02.658Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDKSA-2005:235", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235" }, { "name": "18684", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18684" }, { "name": "18056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18056" }, { "name": "18977", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18977" }, { "name": "MDKSA-2005:220", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "name": "MDKSA-2006:044", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044" }, { "name": "15528", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15528" }, { "name": "DSA-922", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "FLSA:157459-4", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded" }, { "name": "USN-219-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/219-1/" }, { "name": "RHSA-2006:0190", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d" }, { "name": "MDKSA-2005:218", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "name": "17826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17826" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://lkml.org/lkml/2005/6/23/249" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://lkml.org/lkml/2005/6/24/173" }, { "name": "oval:org.mitre.oval:def:11723", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723" }, { "name": "FLSA:157459-3", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "RHSA-2005:663", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-663.html" }, { "name": "MDKSA-2005:219", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3274", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDKSA-2005:235", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235" }, { "name": "18684", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18684" }, { "name": "18056", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18056" }, { "name": "18977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18977" }, { "name": "MDKSA-2005:220", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "name": "MDKSA-2006:044", "refsource": "MANDRIVA", "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044" }, { "name": "15528", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15528" }, { "name": "DSA-922", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "FLSA:157459-4", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded" }, { "name": "USN-219-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/219-1/" }, { "name": "RHSA-2006:0190", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=e684f066dff5628bb61ad1912de6e8058b5b4c7d", "refsource": "CONFIRM", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=e684f066dff5628bb61ad1912de6e8058b5b4c7d" }, { "name": "MDKSA-2005:218", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "name": "17826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17826" }, { "name": "http://lkml.org/lkml/2005/6/23/249", "refsource": "CONFIRM", "url": "http://lkml.org/lkml/2005/6/23/249" }, { "name": "http://lkml.org/lkml/2005/6/24/173", "refsource": "CONFIRM", "url": "http://lkml.org/lkml/2005/6/24/173" }, { "name": "oval:org.mitre.oval:def:11723", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723" }, { "name": "FLSA:157459-3", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "RHSA-2005:663", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-663.html" }, { "name": "MDKSA-2005:219", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3274", "datePublished": "2005-10-20T04:00:00", "dateReserved": "2005-10-20T00:00:00", "dateUpdated": "2024-10-15T14:15:02.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-3274\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-10-21T01:02:00.000\",\"lastModified\":\"2024-01-21T01:26:05.657\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":4.7,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":1.0,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:H/Au:N/C:N/I:N/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":1.2},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":1.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndIncluding\":\"2.4.31\",\"matchCriteriaId\":\"C9E64153-4A9A-448A-9654-5C79B4C86646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.0\",\"versionEndExcluding\":\"2.6.13\",\"matchCriteriaId\":\"43EDD335-A1D2-46B5-AED5-066CB1127212\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873\"}]}]}],\"references\":[{\"url\":\"http://lkml.org/lkml/2005/6/23/249\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://lkml.org/lkml/2005/6/24/173\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://secunia.com/advisories/17826\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/18056\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/18684\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/18977\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-922\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:218\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:235\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-663.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0190.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/427980/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/427981/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/15528\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://usn.ubuntu.com/219-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]}]}}" } }
ghsa-53p3-f48x-w9j5
Vulnerability from github
Published
2022-05-01 02:16
Modified
2024-01-21 03:30
Severity ?
Details
Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
{ "affected": [], "aliases": [ "CVE-2005-3274" ], "database_specific": { "cwe_ids": [ "CWE-476" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-10-21T01:02:00Z", "severity": "LOW" }, "details": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.", "id": "GHSA-53p3-f48x-w9j5", "modified": "2024-01-21T03:30:23Z", "published": "2022-05-01T02:16:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723" }, { "type": "WEB", "url": "https://usn.ubuntu.com/219-1" }, { "type": "WEB", "url": "http://lkml.org/lkml/2005/6/23/249" }, { "type": "WEB", "url": "http://lkml.org/lkml/2005/6/24/173" }, { "type": "WEB", "url": "http://secunia.com/advisories/17826" }, { "type": "WEB", "url": "http://secunia.com/advisories/18056" }, { "type": "WEB", "url": "http://secunia.com/advisories/18684" }, { "type": "WEB", "url": "http://secunia.com/advisories/18977" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-922" }, { "type": "WEB", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d" }, { "type": "WEB", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=e684f066dff5628bb61ad1912de6e8058b5b4c7d" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-663.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/15528" }, { "type": "WEB", "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
rhsa-2006_0190
Vulnerability from csaf_redhat
Published
2006-02-01 17:48
Modified
2024-11-05 16:36
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix a number of security issues as well as
other bugs are now available for Red Hat Enterprise Linux 2.1 (64 bit
architectures).
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described
below:
- a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)
- a race condition that allowed local users to read the environment
variables of another process (CVE-2004-1058, low)
- a flaw in the open_exec function of execve that allowed a local user to
read setuid ELF binaries that should otherwise be protected by standard
permissions. (CVE-2004-1073, moderate). Red Hat originally reported this
flaw as being fixed by RHSA-2004:504, but a patch for this issue was
missing from that update.
- a potential leak of kernel data from ext2 file system handling
(CVE-2005-0400, low)
- flaws in ISO-9660 file system handling that allowed the mounting of
an invalid image on a CD-ROM to cause a denial of service (crash)
or potentially execute arbitrary code (CVE-2005-0815, moderate)
- a flaw in gzip/zlib handling internal to the kernel that may allow a
local user to cause a denial of service (crash) (CVE-2005-2458, low)
- a flaw in exec() handling on some 64-bit architectures that allowed a
local user to cause a denial of service (crash) (CVE-2005-2708, important)
- a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)
- a flaw in IPv6 network UDP port hash table lookups that allowed a local
user to cause a denial of service (hang) (CVE-2005-2973, important)
- a network buffer info leak using the orinoco driver that allowed a remote
user to possibly view uninitialized data (CVE-2005-3180, important)
- a race condition affecting SMP systems that allowed a local user to cause
a denial of service (crash) (CVE-2005-3274, important)
- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a
local user to cause a denial of service (crash) (CVE-2005-3275, important)
- a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)
The following bugs were also addressed:
- Handle set_brk() errors in binfmt_elf
- Correct scsi error return
All Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix a number of security issues as well as\nother bugs are now available for Red Hat Enterprise Linux 2.1 (64 bit\narchitectures).\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues described\nbelow:\n\n- a flaw in network IGMP processing that a allowed a remote user on the\nlocal network to cause a denial of service (disabling of multicast reports)\nif the system is running multicast applications (CVE-2002-2185, moderate) \n\n- a race condition that allowed local users to read the environment\nvariables of another process (CVE-2004-1058, low)\n\n- a flaw in the open_exec function of execve that allowed a local user to\nread setuid ELF binaries that should otherwise be protected by standard\npermissions. (CVE-2004-1073, moderate). Red Hat originally reported this\nflaw as being fixed by RHSA-2004:504, but a patch for this issue was\nmissing from that update.\n\n- a potential leak of kernel data from ext2 file system handling\n(CVE-2005-0400, low) \n\n- flaws in ISO-9660 file system handling that allowed the mounting of\nan invalid image on a CD-ROM to cause a denial of service (crash)\nor potentially execute arbitrary code (CVE-2005-0815, moderate) \n\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \n\n- a flaw in exec() handling on some 64-bit architectures that allowed a\nlocal user to cause a denial of service (crash) (CVE-2005-2708, important) \n\n- a flaw in procfs handling during unloading of modules that allowed a\nlocal user to cause a denial of service or potentially gain privileges\n(CVE-2005-2709, moderate) \n\n- a flaw in IPv6 network UDP port hash table lookups that allowed a local\nuser to cause a denial of service (hang) (CVE-2005-2973, important) \n\n- a network buffer info leak using the orinoco driver that allowed a remote\nuser to possibly view uninitialized data (CVE-2005-3180, important) \n\n- a race condition affecting SMP systems that allowed a local user to cause\na denial of service (crash) (CVE-2005-3274, important)\n\n- a flaw in IPv4 network TCP and UDP netfilter handling that allowed a\nlocal user to cause a denial of service (crash) (CVE-2005-3275, important) \n\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\ndenial of service (crash) (CVE-2005-3806, important) \n\nThe following bugs were also addressed:\n\n- Handle set_brk() errors in binfmt_elf\n\n- Correct scsi error return\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0190", "url": "https://access.redhat.com/errata/RHSA-2006:0190" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "133117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=133117" }, { "category": "external", "summary": "144172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144172" }, { "category": "external", "summary": "152402", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152402" }, { "category": "external", "summary": "152408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152408" }, { "category": "external", "summary": "152554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152554" }, { "category": "external", "summary": "165681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165681" }, { "category": "external", "summary": "168313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168313" }, { "category": "external", "summary": "168927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168927" }, { "category": "external", "summary": "170279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170279" }, { "category": "external", "summary": "170775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170775" }, { "category": "external", "summary": "171385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171385" }, { "category": "external", "summary": "171388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171388" }, { "category": "external", "summary": "174083", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174083" }, { "category": "external", "summary": "174810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174810" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0190.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-05T16:36:05+00:00", "generator": { "date": "2024-11-05T16:36:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2006:0190", "initial_release_date": "2006-02-01T17:48:00+00:00", "revision_history": [ { "date": "2006-02-01T17:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-02-01T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:36:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-2185", "discovery_date": "2005-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616930" } ], "notes": [ { "category": "description", "text": "The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target\u0027s Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-2185" }, { "category": "external", "summary": "RHBZ#1616930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-2185", "url": "https://www.cve.org/CVERecord?id=CVE-2002-2185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185" } ], "release_date": "2002-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1058", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617360" } ], "notes": [ { "category": "description", "text": "Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1058" }, { "category": "external", "summary": "RHBZ#1617360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1058", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1058" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1058" } ], "release_date": "2004-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1073", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617366" } ], "notes": [ { "category": "description", "text": "The open_exec function in the execve functionality (exec.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, allows local users to read non-readable ELF binaries by using the interpreter (PT_INTERP) functionality.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1073" }, { "category": "external", "summary": "RHBZ#1617366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617366" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1073", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1073" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1073" } ], "release_date": "2004-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0400", "discovery_date": "2005-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617518" } ], "notes": [ { "category": "description", "text": "The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0400" }, { "category": "external", "summary": "RHBZ#1617518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617518" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0400", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0400" } ], "release_date": "2005-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-0815", "discovery_date": "2005-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617584" } ], "notes": [ { "category": "description", "text": "Multiple \"range checking flaws\" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0815" }, { "category": "external", "summary": "RHBZ#1617584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0815", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0815" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0815", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0815" } ], "release_date": "2005-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2458", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617720" } ], "notes": [ { "category": "description", "text": "inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with \"improper tables\".", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2458" }, { "category": "external", "summary": "RHBZ#1617720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2458", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458" } ], "release_date": "1999-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-2708", "discovery_date": "2005-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617750" } ], "notes": [ { "category": "description", "text": "The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2708" }, { "category": "external", "summary": "RHBZ#1617750", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617750" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2708", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2708" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2708", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2708" } ], "release_date": "2005-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2709", "discovery_date": "2005-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617751" } ], "notes": [ { "category": "description", "text": "The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2709" }, { "category": "external", "summary": "RHBZ#1617751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2709", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709" } ], "release_date": "2005-11-08T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2973", "discovery_date": "2005-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617770" } ], "notes": [ { "category": "description", "text": "The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2973" }, { "category": "external", "summary": "RHBZ#1617770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617770" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2973", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2973" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2973", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2973" } ], "release_date": "2005-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3180", "discovery_date": "2005-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617790" } ], "notes": [ { "category": "description", "text": "The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3180" }, { "category": "external", "summary": "RHBZ#1617790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617790" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3180", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3180" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3180", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3180" } ], "release_date": "2005-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3274", "discovery_date": "2005-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617811" } ], "notes": [ { "category": "description", "text": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3274" }, { "category": "external", "summary": "RHBZ#1617811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617811" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3274", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274" } ], "release_date": "2005-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3275", "discovery_date": "2005-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617812" } ], "notes": [ { "category": "description", "text": "The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3275" }, { "category": "external", "summary": "RHBZ#1617812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617812" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3275", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275" } ], "release_date": "2005-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3806", "discovery_date": "2005-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617840" } ], "notes": [ { "category": "description", "text": "The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3806" }, { "category": "external", "summary": "RHBZ#1617840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806" } ], "release_date": "2005-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-02-01T17:48:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2005_663
Vulnerability from csaf_redhat
Published
2005-09-28 14:17
Modified
2024-11-05 16:33
Summary
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6
Notes
Topic
Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 3. This is the sixth
regular update.
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
This is the sixth regular kernel update to Red Hat Enterprise Linux 3.
New features introduced by this update include:
- diskdump support on HP Smart Array devices
- netconsole/netdump support over bonded interfaces
- new chipset and device support via PCI table updates
- support for new "oom-kill" and "kscand_work_percent" sysctls
- support for dual core processors and ACPI Power Management timers on
AMD64 and Intel EM64T systems
There were many bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement in
the reliability and scalability of Red Hat Enterprise Linux 3.
There were numerous driver updates and security fixes (elaborated below).
Other key areas affected by fixes in this update include kswapd, inode
handling, the SATA subsystem, diskdump handling, ptrace() syscall support,
and signal handling.
The following device drivers have been upgraded to new versions:
3w-9xxx ---- 2.24.03.008RH
cciss ------ 2.4.58.RH1
e100 ------- 3.4.8-k2
e1000 ------ 6.0.54-k2
emulex ----- 7.3.2
fusion ----- 2.06.16i.01
iscsi ------ 3.6.2.1
ipmi ------- 35.4
lpfcdfc ---- 1.2.1
qlogic ----- 7.05.00-RH1
tg3 -------- 3.27RH
The following security bugs were fixed in this update:
- a flaw in syscall argument checking on Itanium systems that allowed
a local user to cause a denial of service (crash) (CAN-2005-0136)
- a flaw in stack expansion that allowed a local user of mlockall()
to cause a denial of service (memory exhaustion) (CAN-2005-0179)
- a small memory leak in network packet defragmenting that allowed a
remote user to cause a denial of service (memory exhaustion) on
systems using netfilter (CAN-2005-0210)
- flaws in ptrace() syscall handling on AMD64 and Intel EM64T systems
that allowed a local user to cause a denial of service (crash)
(CAN-2005-0756, CAN-2005-1762, CAN-2005-2553)
- flaws in ISO-9660 file system handling that allowed the mounting of
an invalid image on a CD-ROM to cause a denial of service (crash)
or potentially execute arbitrary code (CAN-2005-0815)
- a flaw in ptrace() syscall handling on Itanium systems that allowed
a local user to cause a denial of service (crash) (CAN-2005-1761)
- a flaw in the alternate stack switching on AMD64 and Intel EM64T
systems that allowed a local user to cause a denial of service
(crash) (CAN-2005-1767)
- race conditions in the ia32-compat support for exec() syscalls on
AMD64, Intel EM64T, and Itanium systems that could allow a local
user to cause a denial of service (crash) (CAN-2005-1768)
- flaws in IPSEC network handling that allowed a local user to cause
a denial of service or potentially gain privileges (CAN-2005-2456,
CAN-2005-2555)
- a flaw in sendmsg() syscall handling on 64-bit systems that allowed
a local user to cause a denial of service or potentially gain
privileges (CAN-2005-2490)
- flaws in unsupported modules that allowed denial-of-service attacks
(crashes) or local privilege escalations on systems using the drm,
coda, or moxa modules (CAN-2004-1056, CAN-2005-0124, CAN-2005-0504)
- potential leaks of kernel data from jfs and ext2 file system handling
(CAN-2004-0181, CAN-2005-0400)
Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.
All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing support and\nmaintenance of Red Hat Enterprise Linux version 3. This is the sixth\nregular update.\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the sixth regular kernel update to Red Hat Enterprise Linux 3.\n\nNew features introduced by this update include:\n\n - diskdump support on HP Smart Array devices\n - netconsole/netdump support over bonded interfaces\n - new chipset and device support via PCI table updates\n - support for new \"oom-kill\" and \"kscand_work_percent\" sysctls\n - support for dual core processors and ACPI Power Management timers on\n AMD64 and Intel EM64T systems\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement in\nthe reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated below).\nOther key areas affected by fixes in this update include kswapd, inode\nhandling, the SATA subsystem, diskdump handling, ptrace() syscall support,\nand signal handling.\n\nThe following device drivers have been upgraded to new versions:\n\n 3w-9xxx ---- 2.24.03.008RH\n cciss ------ 2.4.58.RH1\n e100 ------- 3.4.8-k2\n e1000 ------ 6.0.54-k2\n emulex ----- 7.3.2\n fusion ----- 2.06.16i.01\n iscsi ------ 3.6.2.1\n ipmi ------- 35.4\n lpfcdfc ---- 1.2.1\n qlogic ----- 7.05.00-RH1\n tg3 -------- 3.27RH\n\nThe following security bugs were fixed in this update:\n\n - a flaw in syscall argument checking on Itanium systems that allowed\n a local user to cause a denial of service (crash) (CAN-2005-0136)\n\n - a flaw in stack expansion that allowed a local user of mlockall()\n to cause a denial of service (memory exhaustion) (CAN-2005-0179)\n\n - a small memory leak in network packet defragmenting that allowed a\n remote user to cause a denial of service (memory exhaustion) on\n systems using netfilter (CAN-2005-0210)\n\n - flaws in ptrace() syscall handling on AMD64 and Intel EM64T systems\n that allowed a local user to cause a denial of service (crash)\n (CAN-2005-0756, CAN-2005-1762, CAN-2005-2553)\n\n - flaws in ISO-9660 file system handling that allowed the mounting of\n an invalid image on a CD-ROM to cause a denial of service (crash)\n or potentially execute arbitrary code (CAN-2005-0815)\n\n - a flaw in ptrace() syscall handling on Itanium systems that allowed\n a local user to cause a denial of service (crash) (CAN-2005-1761)\n\n - a flaw in the alternate stack switching on AMD64 and Intel EM64T\n systems that allowed a local user to cause a denial of service\n (crash) (CAN-2005-1767)\n\n - race conditions in the ia32-compat support for exec() syscalls on\n AMD64, Intel EM64T, and Itanium systems that could allow a local\n user to cause a denial of service (crash) (CAN-2005-1768)\n\n - flaws in IPSEC network handling that allowed a local user to cause\n a denial of service or potentially gain privileges (CAN-2005-2456,\n CAN-2005-2555)\n\n - a flaw in sendmsg() syscall handling on 64-bit systems that allowed\n a local user to cause a denial of service or potentially gain\n privileges (CAN-2005-2490)\n\n - flaws in unsupported modules that allowed denial-of-service attacks\n (crashes) or local privilege escalations on systems using the drm,\n coda, or moxa modules (CAN-2004-1056, CAN-2005-0124, CAN-2005-0504)\n\n - potential leaks of kernel data from jfs and ext2 file system handling\n (CAN-2004-0181, CAN-2005-0400)\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:663", "url": "https://access.redhat.com/errata/RHSA-2005:663" }, { "category": "external", "summary": "79086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79086" }, { "category": "external", "summary": "98542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=98542" }, { "category": "external", "summary": "99502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=99502" }, { "category": "external", "summary": "116037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=116037" }, { "category": "external", "summary": "116317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=116317" }, { "category": "external", "summary": "116900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=116900" }, { "category": "external", "summary": "119451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=119451" }, { "category": "external", "summary": "121041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=121041" }, { "category": "external", "summary": "122982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=122982" }, { "category": "external", "summary": "123331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=123331" }, { "category": "external", "summary": "128428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=128428" }, { "category": "external", "summary": "128788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=128788" }, { "category": "external", "summary": "128907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=128907" }, { "category": "external", "summary": "129853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129853" }, { "category": "external", "summary": "131029", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131029" }, { "category": "external", "summary": "131136", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131136" }, { "category": "external", "summary": "131886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131886" }, { "category": "external", "summary": "132754", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=132754" }, { "category": "external", "summary": "134579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134579" }, { "category": "external", "summary": "137788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137788" }, { "category": "external", "summary": "138192", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138192" }, { "category": "external", "summary": "138534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138534" }, { "category": "external", "summary": "139033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=139033" }, { "category": "external", "summary": "139113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=139113" }, { "category": "external", "summary": "140849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=140849" }, { "category": "external", "summary": "142263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142263" }, { "category": "external", "summary": "142532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142532" }, { "category": "external", "summary": "142586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142586" }, { "category": "external", "summary": "142856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142856" }, { "category": "external", "summary": "142960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142960" }, { "category": "external", "summary": "143823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=143823" }, { "category": "external", "summary": "144524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144524" }, { "category": "external", "summary": "144781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144781" }, { "category": "external", "summary": "145476", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145476" }, { "category": "external", "summary": "145551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145551" }, { "category": "external", "summary": "145950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145950" }, { "category": "external", "summary": "146080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146080" }, { "category": "external", "summary": "146105", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146105" }, { "category": "external", "summary": "146460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146460" }, { "category": "external", "summary": "147823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147823" }, { "category": "external", "summary": "148862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=148862" }, { "category": "external", "summary": "149011", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149011" }, { "category": "external", "summary": "149405", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149405" }, { "category": "external", "summary": "149636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149636" }, { "category": "external", "summary": "149691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149691" }, { "category": "external", "summary": "149965", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149965" }, { "category": "external", "summary": "150019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150019" }, { "category": "external", "summary": "150130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150130" }, { "category": "external", "summary": "150209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150209" }, { "category": "external", "summary": "151054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151054" }, { "category": "external", "summary": "151488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151488" }, { "category": "external", "summary": "151920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151920" }, { "category": "external", "summary": "152400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152400" }, { "category": "external", "summary": "152406", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152406" }, { "category": "external", "summary": "153775", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=153775" }, { "category": "external", "summary": "154245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154245" }, { "category": "external", "summary": "154678", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154678" }, { "category": "external", "summary": "154797", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154797" }, { "category": "external", "summary": "154925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154925" }, { "category": "external", "summary": "155244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155244" }, { "category": "external", "summary": "155259", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155259" }, { "category": "external", "summary": "155289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155289" }, { "category": "external", "summary": "155365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155365" }, { "category": "external", "summary": "155473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155473" }, { "category": "external", "summary": "155978", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155978" }, { "category": "external", "summary": "156142", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156142" }, { "category": "external", "summary": "156364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156364" }, { "category": "external", "summary": "156608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156608" }, { "category": "external", "summary": "156644", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156644" }, { "category": "external", "summary": "156831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156831" }, { "category": "external", "summary": "156923", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156923" }, { "category": "external", "summary": "156985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156985" }, { "category": "external", "summary": "156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156989" }, { "category": "external", "summary": "156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156991" }, { "category": "external", "summary": "156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156993" }, { "category": "external", "summary": "156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156994" }, { "category": "external", "summary": "156998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156998" }, { "category": "external", "summary": "157075", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157075" }, { "category": "external", "summary": "157434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157434" }, { "category": "external", "summary": "157439", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157439" }, { "category": "external", "summary": "157446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157446" }, { "category": "external", "summary": "157571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157571" }, { "category": "external", "summary": "157669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157669" }, { "category": "external", "summary": "157846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157846" }, { "category": "external", "summary": "157849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157849" }, { "category": "external", "summary": "158358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158358" }, { "category": "external", "summary": "158456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158456" }, { "category": "external", "summary": "158457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158457" }, { "category": "external", "summary": "158459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158459" }, { "category": "external", "summary": "158581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158581" }, { "category": "external", "summary": "158724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158724" }, { "category": "external", "summary": "158814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158814" }, { "category": "external", "summary": "158817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158817" }, { "category": "external", "summary": "158877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158877" }, { "category": "external", "summary": "158880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158880" }, { "category": "external", "summary": "159045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159045" }, { "category": "external", "summary": "159300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159300" }, { "category": "external", "summary": "159330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159330" }, { "category": "external", "summary": "159420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159420" }, { "category": "external", "summary": "159790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159790" }, { "category": "external", "summary": "159814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159814" }, { "category": "external", "summary": "159823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159823" }, { "category": "external", "summary": "159915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159915" }, { "category": "external", "summary": "159917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159917" }, { "category": "external", "summary": "159938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159938" }, { "category": "external", "summary": "159979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159979" }, { "category": "external", "summary": "159989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159989" }, { "category": "external", "summary": "159991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159991" }, { "category": "external", "summary": "159992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159992" }, { "category": "external", "summary": "159993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159993" }, { "category": "external", "summary": "160093", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160093" }, { "category": "external", "summary": "160199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160199" }, { "category": "external", "summary": "160392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160392" }, { "category": "external", "summary": "160400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160400" }, { "category": "external", "summary": "160495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160495" }, { "category": "external", "summary": "160664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160664" }, { "category": "external", "summary": "160752", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160752" }, { "category": "external", "summary": "160799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160799" }, { "category": "external", "summary": "160820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160820" }, { "category": "external", "summary": "161097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161097" }, { "category": "external", "summary": "161238", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161238" }, { "category": "external", "summary": "161657", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161657" }, { "category": "external", "summary": "161957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161957" }, { "category": "external", "summary": "161986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161986" }, { "category": "external", "summary": "162103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162103" }, { "category": "external", "summary": "162603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162603" }, { "category": "external", "summary": "163152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163152" }, { "category": "external", "summary": "164074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164074" }, { "category": "external", "summary": "164185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164185" }, { "category": "external", "summary": "164226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164226" }, { "category": "external", "summary": "164819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164819" }, { "category": "external", "summary": "165467", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165467" }, { "category": "external", "summary": "165565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165565" }, { "category": "external", "summary": "165739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165739" }, { "category": "external", "summary": "165841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165841" }, { "category": "external", "summary": "165850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165850" }, { "category": "external", "summary": "165866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165866" }, { "category": "external", "summary": "165993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165993" }, { "category": "external", "summary": "166066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166066" }, { "category": "external", "summary": "166132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166132" }, { "category": "external", "summary": "166172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166172" }, { "category": "external", "summary": "166329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166329" }, { "category": "external", "summary": "167047", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167047" }, { "category": "external", "summary": "167222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167222" }, { "category": "external", "summary": "167265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167265" }, { "category": "external", "summary": "167369", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167369" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_663.json" } ], "title": "Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6", "tracking": { "current_release_date": "2024-11-05T16:33:17+00:00", "generator": { "date": "2024-11-05T16:33:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2005:663", "initial_release_date": "2005-09-28T14:17:00+00:00", "revision_history": [ { "date": "2005-09-28T14:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-09-28T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:33:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-37.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-37.EL.i686", "product_id": "kernel-smp-0:2.4.21-37.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-37.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-37.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-37.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-37.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-37.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-37.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-37.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-37.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-37.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-37.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-37.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-37.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-37.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.i686", "product": { "name": "kernel-0:2.4.21-37.EL.i686", "product_id": "kernel-0:2.4.21-37.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-37.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-37.EL.athlon", "product_id": "kernel-smp-0:2.4.21-37.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-37.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-37.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-37.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-37.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-37.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-37.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.athlon", "product": { "name": "kernel-0:2.4.21-37.EL.athlon", "product_id": "kernel-0:2.4.21-37.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-37.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-37.EL.i386", "product_id": "kernel-doc-0:2.4.21-37.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-37.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-37.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-37.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-37.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-37.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-37.EL.i386", "product": { "name": "kernel-source-0:2.4.21-37.EL.i386", "product_id": "kernel-source-0:2.4.21-37.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-37.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-37.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-37.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-37.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-37.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-37.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-37.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-37.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-37.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-37.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-37.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-37.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-37.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-37.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-37.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-37.EL.x86_64", "product_id": "kernel-source-0:2.4.21-37.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-37.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.x86_64", "product": { "name": "kernel-0:2.4.21-37.EL.x86_64", "product_id": "kernel-0:2.4.21-37.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-37.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-37.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-37.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.ia32e", "product": { "name": "kernel-0:2.4.21-37.EL.ia32e", "product_id": "kernel-0:2.4.21-37.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-37.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-37.EL.ia64", "product_id": "kernel-doc-0:2.4.21-37.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-37.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-37.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-37.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-37.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-37.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-37.EL.ia64", "product_id": "kernel-source-0:2.4.21-37.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-37.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.ia64", "product": { "name": "kernel-0:2.4.21-37.EL.ia64", "product_id": "kernel-0:2.4.21-37.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.src", "product": { "name": "kernel-0:2.4.21-37.EL.src", "product_id": "kernel-0:2.4.21-37.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-37.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-37.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-37.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-37.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-37.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-37.EL.ppc64", "product_id": "kernel-source-0:2.4.21-37.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-37.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-37.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-37.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-37.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-37.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-37.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-37.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-37.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-37.EL.s390x", "product_id": "kernel-doc-0:2.4.21-37.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-37.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-37.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-37.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-37.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-37.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-37.EL.s390x", "product_id": "kernel-source-0:2.4.21-37.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-37.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.s390x", "product": { "name": "kernel-0:2.4.21-37.EL.s390x", "product_id": "kernel-0:2.4.21-37.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-37.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-37.EL.s390", "product_id": "kernel-doc-0:2.4.21-37.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-37.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-37.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-37.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-37.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-37.EL.s390", "product": { "name": "kernel-source-0:2.4.21-37.EL.s390", "product_id": "kernel-source-0:2.4.21-37.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-37.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-37.EL.s390", "product": { "name": "kernel-0:2.4.21-37.EL.s390", "product_id": "kernel-0:2.4.21-37.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-37.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-37.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-37.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-37.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.src" }, "product_reference": "kernel-0:2.4.21-37.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.src" }, "product_reference": "kernel-0:2.4.21-37.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-37.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-37.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.src" }, "product_reference": "kernel-0:2.4.21-37.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.src" }, "product_reference": "kernel-0:2.4.21-37.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-37.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-37.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-37.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-37.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-37.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-37.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-37.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0181", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617172" } ], "notes": [ { "category": "description", "text": "The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0181" }, { "category": "external", "summary": "RHBZ#1617172", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617172" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0181", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0181" } ], "release_date": "2004-02-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1056", "discovery_date": "2004-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617358" } ], "notes": [ { "category": "description", "text": "Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1056" }, { "category": "external", "summary": "RHBZ#1617358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617358" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1056", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1056" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1056", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1056" } ], "release_date": "2004-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0124", "discovery_date": "2005-01-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617464" } ], "notes": [ { "category": "description", "text": "The coda_pioctl function in the coda functionality (pioctl.c) for Linux kernel 2.6.9 and 2.4.x before 2.4.29 may allow local users to cause a denial of service (crash) or execute arbitrary code via negative vi.in_size or vi.out_size values, which may trigger a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0124" }, { "category": "external", "summary": "RHBZ#1617464", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617464" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0124", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0124" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0124", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0124" } ], "release_date": "2005-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0136", "discovery_date": "2005-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617466" } ], "notes": [ { "category": "description", "text": "The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain \"ptrace corner cases\" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0136" }, { "category": "external", "summary": "RHBZ#1617466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617466" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0136", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0136" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0136", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0136" } ], "release_date": "2005-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0179", "discovery_date": "2005-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617484" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0179" }, { "category": "external", "summary": "RHBZ#1617484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617484" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0179", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0179" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0179", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0179" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0210", "discovery_date": "2005-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617497" } ], "notes": [ { "category": "description", "text": "Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0210" }, { "category": "external", "summary": "RHBZ#1617497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0210", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0210" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0210", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0210" } ], "release_date": "2005-01-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-0400", "discovery_date": "2005-03-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617518" } ], "notes": [ { "category": "description", "text": "The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0400" }, { "category": "external", "summary": "RHBZ#1617518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617518" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0400", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0400" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0400", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0400" } ], "release_date": "2005-03-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-0504", "discovery_date": "2007-04-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "423111" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value.", "title": "Vulnerability description" }, { "category": "summary", "text": "Buffer overflow in moxa driver", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0504" }, { "category": "external", "summary": "RHBZ#423111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=423111" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0504", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0504" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0504", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0504" } ], "release_date": "2007-04-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Buffer overflow in moxa driver" }, { "cve": "CVE-2005-0756", "discovery_date": "2005-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617571" } ], "notes": [ { "category": "description", "text": "ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0756" }, { "category": "external", "summary": "RHBZ#1617571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617571" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0756", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0756" } ], "release_date": "2005-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0815", "discovery_date": "2005-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617584" } ], "notes": [ { "category": "description", "text": "Multiple \"range checking flaws\" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0815" }, { "category": "external", "summary": "RHBZ#1617584", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617584" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0815", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0815" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0815", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0815" } ], "release_date": "2005-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-1761", "discovery_date": "2005-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617665" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1761" }, { "category": "external", "summary": "RHBZ#1617665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617665" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1761", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1761" } ], "release_date": "2005-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1762", "discovery_date": "2005-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617666" } ], "notes": [ { "category": "description", "text": "The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a \"non-canonical\" address.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1762" }, { "category": "external", "summary": "RHBZ#1617666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617666" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1762", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1762" } ], "release_date": "2005-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1767", "discovery_date": "2005-05-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617669" } ], "notes": [ { "category": "description", "text": "traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1767" }, { "category": "external", "summary": "RHBZ#1617669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1767", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1767" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1767", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1767" } ], "release_date": "2005-06-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1768", "discovery_date": "2005-06-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617670" } ], "notes": [ { "category": "description", "text": "Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1768" }, { "category": "external", "summary": "RHBZ#1617670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617670" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1768", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1768" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1768", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1768" } ], "release_date": "2005-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2456", "discovery_date": "2005-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617719" } ], "notes": [ { "category": "description", "text": "Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p-\u003edir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock-\u003esk_policy array.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2456" }, { "category": "external", "summary": "RHBZ#1617719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617719" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2456", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2456" } ], "release_date": "2005-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2490", "discovery_date": "2005-08-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617724" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2490" }, { "category": "external", "summary": "RHBZ#1617724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2490", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2490" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2490", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2490" } ], "release_date": "2005-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2553", "discovery_date": "2005-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617733" } ], "notes": [ { "category": "description", "text": "The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2553" }, { "category": "external", "summary": "RHBZ#1617733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617733" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2553", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2553" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2555", "discovery_date": "2005-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617734" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2555" }, { "category": "external", "summary": "RHBZ#1617734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2555", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2555" } ], "release_date": "2005-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3273", "discovery_date": "2004-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617810" } ], "notes": [ { "category": "description", "text": "The rose_rt_ioctl function in rose_route.c for Radionet Open Source Environment (ROSE) in Linux 2.6 kernels before 2.6.12, and 2.4 before 2.4.29, does not properly verify the ndigis argument for a new route, which allows attackers to trigger array out-of-bounds errors with a large number of digipeats.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3273" }, { "category": "external", "summary": "RHBZ#1617810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617810" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3273", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3273" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3273", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3273" } ], "release_date": "2004-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-3274", "discovery_date": "2005-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617811" } ], "notes": [ { "category": "description", "text": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3274" }, { "category": "external", "summary": "RHBZ#1617811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617811" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3274", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274" } ], "release_date": "2005-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-09-28T14:17:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-37.EL.athlon", "3AS:kernel-0:2.4.21-37.EL.i686", "3AS:kernel-0:2.4.21-37.EL.ia32e", "3AS:kernel-0:2.4.21-37.EL.ia64", "3AS:kernel-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-0:2.4.21-37.EL.s390", "3AS:kernel-0:2.4.21-37.EL.s390x", "3AS:kernel-0:2.4.21-37.EL.src", "3AS:kernel-0:2.4.21-37.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3AS:kernel-doc-0:2.4.21-37.EL.i386", "3AS:kernel-doc-0:2.4.21-37.EL.ia64", "3AS:kernel-doc-0:2.4.21-37.EL.ppc64", "3AS:kernel-doc-0:2.4.21-37.EL.s390", "3AS:kernel-doc-0:2.4.21-37.EL.s390x", "3AS:kernel-doc-0:2.4.21-37.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-37.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-0:2.4.21-37.EL.i686", "3AS:kernel-smp-0:2.4.21-37.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3AS:kernel-source-0:2.4.21-37.EL.i386", "3AS:kernel-source-0:2.4.21-37.EL.ia64", "3AS:kernel-source-0:2.4.21-37.EL.ppc64", "3AS:kernel-source-0:2.4.21-37.EL.s390", "3AS:kernel-source-0:2.4.21-37.EL.s390x", "3AS:kernel-source-0:2.4.21-37.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-37.EL.i686", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390", "3AS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-0:2.4.21-37.EL.athlon", "3Desktop:kernel-0:2.4.21-37.EL.i686", "3Desktop:kernel-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-0:2.4.21-37.EL.ia64", "3Desktop:kernel-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-37.EL.s390", "3Desktop:kernel-0:2.4.21-37.EL.s390x", "3Desktop:kernel-0:2.4.21-37.EL.src", "3Desktop:kernel-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-37.EL.i386", "3Desktop:kernel-doc-0:2.4.21-37.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390", "3Desktop:kernel-doc-0:2.4.21-37.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-37.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-37.EL.i386", "3Desktop:kernel-source-0:2.4.21-37.EL.ia64", "3Desktop:kernel-source-0:2.4.21-37.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-37.EL.s390", "3Desktop:kernel-source-0:2.4.21-37.EL.s390x", "3Desktop:kernel-source-0:2.4.21-37.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-0:2.4.21-37.EL.athlon", "3ES:kernel-0:2.4.21-37.EL.i686", "3ES:kernel-0:2.4.21-37.EL.ia32e", "3ES:kernel-0:2.4.21-37.EL.ia64", "3ES:kernel-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-0:2.4.21-37.EL.s390", "3ES:kernel-0:2.4.21-37.EL.s390x", "3ES:kernel-0:2.4.21-37.EL.src", "3ES:kernel-0:2.4.21-37.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-37.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3ES:kernel-doc-0:2.4.21-37.EL.i386", "3ES:kernel-doc-0:2.4.21-37.EL.ia64", "3ES:kernel-doc-0:2.4.21-37.EL.ppc64", "3ES:kernel-doc-0:2.4.21-37.EL.s390", "3ES:kernel-doc-0:2.4.21-37.EL.s390x", "3ES:kernel-doc-0:2.4.21-37.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-37.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-0:2.4.21-37.EL.i686", "3ES:kernel-smp-0:2.4.21-37.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3ES:kernel-source-0:2.4.21-37.EL.i386", "3ES:kernel-source-0:2.4.21-37.EL.ia64", "3ES:kernel-source-0:2.4.21-37.EL.ppc64", "3ES:kernel-source-0:2.4.21-37.EL.s390", "3ES:kernel-source-0:2.4.21-37.EL.s390x", "3ES:kernel-source-0:2.4.21-37.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-37.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-37.EL.i686", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-37.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390", "3ES:kernel-unsupported-0:2.4.21-37.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-0:2.4.21-37.EL.athlon", "3WS:kernel-0:2.4.21-37.EL.i686", "3WS:kernel-0:2.4.21-37.EL.ia32e", "3WS:kernel-0:2.4.21-37.EL.ia64", "3WS:kernel-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-0:2.4.21-37.EL.s390", "3WS:kernel-0:2.4.21-37.EL.s390x", "3WS:kernel-0:2.4.21-37.EL.src", "3WS:kernel-0:2.4.21-37.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-37.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-37.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-37.EL.x86_64", "3WS:kernel-doc-0:2.4.21-37.EL.i386", "3WS:kernel-doc-0:2.4.21-37.EL.ia64", "3WS:kernel-doc-0:2.4.21-37.EL.ppc64", "3WS:kernel-doc-0:2.4.21-37.EL.s390", "3WS:kernel-doc-0:2.4.21-37.EL.s390x", "3WS:kernel-doc-0:2.4.21-37.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-37.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-0:2.4.21-37.EL.i686", "3WS:kernel-smp-0:2.4.21-37.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-37.EL.x86_64", "3WS:kernel-source-0:2.4.21-37.EL.i386", "3WS:kernel-source-0:2.4.21-37.EL.ia64", "3WS:kernel-source-0:2.4.21-37.EL.ppc64", "3WS:kernel-source-0:2.4.21-37.EL.s390", "3WS:kernel-source-0:2.4.21-37.EL.s390x", "3WS:kernel-source-0:2.4.21-37.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-37.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-37.EL.i686", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-37.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390", "3WS:kernel-unsupported-0:2.4.21-37.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-37.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:663" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2005_514
Vulnerability from csaf_redhat
Published
2005-10-05 12:02
Modified
2024-11-05 16:32
Summary
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2
Notes
Topic
Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4. This is the
second regular update.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
This is the second regular kernel update to Red Hat Enterprise Linux 4.
New features introduced in this update include:
- Audit support
- systemtap - kprobes, relayfs
- Keyring support
- iSCSI Initiator - iscsi_sfnet 4:0.1.11-1
- Device mapper multipath support
- Intel dual core support
- esb2 chipset support
- Increased exec-shield coverage
- Dirty page tracking for HA systems
- Diskdump -- allow partial diskdumps and directing to swap
There were several bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 4.
The following security bugs were fixed in this update, detailed below with
corresponding CAN names available from the Common Vulnerabilities and
Exposures project (cve.mitre.org):
- flaws in ptrace() syscall handling on 64-bit systems that allowed a local
user to cause a denial of service (crash) (CAN-2005-0756, CAN-2005-1761,
CAN-2005-1762, CAN-2005-1763)
- flaws in IPSEC network handling that allowed a local user to cause a
denial of service or potentially gain privileges (CAN-2005-2456, CAN-2005-2555)
- a flaw in sendmsg() syscall handling on 64-bit systems that allowed a
local user to cause a denial of service or potentially gain privileges
(CAN-2005-2490)
- a flaw in sendmsg() syscall handling that allowed a local user to cause a
denial of service by altering hardware state (CAN-2005-2492)
- a flaw that prevented the topdown allocator from allocating mmap areas
all the way down to address zero (CAN-2005-1265)
- flaws dealing with keyrings that could cause a local denial of service
(CAN-2005-2098, CAN-2005-2099)
- a flaw in the 4GB split patch that could allow a local denial of service
(CAN-2005-2100)
- a xattr sharing bug in the ext2 and ext3 file systems that could cause
default ACLs to disappear (CAN-2005-2801)
- a flaw in the ipt_recent module on 64-bit architectures which could allow
a remote denial of service (CAN-2005-2872)
The following device drivers have been upgraded to new versions:
qla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2
qla2200 --------- 8.00.00b21-k to 8.01.00b5-rh2
qla2300 --------- 8.00.00b21-k to 8.01.00b5-rh2
qla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2
qla2xxx --------- 8.00.00b21-k to 8.01.00b5-rh2
qla6312 --------- 8.00.00b21-k to 8.01.00b5-rh2
megaraid_mbox --- 2.20.4.5 to 2.20.4.6
megaraid_mm ----- 2.20.2.5 to 2.20.2.6
lpfc ------------ 0:8.0.16.6_x2 to 0:8.0.16.17
cciss ----------- 2.6.4 to 2.6.6
ipw2100 --------- 1.0.3 to 1.1.0
tg3 ------------- 3.22-rh to 3.27-rh
e100 ------------ 3.3.6-k2-NAPI to 3.4.8-k2-NAPI
e1000 ----------- 5.6.10.1-k2-NAPI to 6.0.54-k2-NAPI
3c59x ----------- LK1.1.19
mptbase --------- 3.01.16 to 3.02.18
ixgb ------------ 1.0.66 to 1.0.95-k2-NAPI
libata ---------- 1.10 to 1.11
sata_via -------- 1.0 to 1.1
sata_ahci ------- 1.00 to 1.01
sata_qstor ------ 0.04
sata_sil -------- 0.8 to 0.9
sata_svw -------- 1.05 to 1.06
s390: crypto ---- 1.31 to 1.57
s390: zfcp ------
s390: CTC-MPC ---
s390: dasd -------
s390: cio -------
s390: qeth ------
All Red Hat Enterprise Linux 4 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 4. This is the\nsecond regular update.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the second regular kernel update to Red Hat Enterprise Linux 4.\n\nNew features introduced in this update include:\n- Audit support\n- systemtap - kprobes, relayfs\n- Keyring support\n- iSCSI Initiator - iscsi_sfnet 4:0.1.11-1\n- Device mapper multipath support\n- Intel dual core support\n- esb2 chipset support\n- Increased exec-shield coverage\n- Dirty page tracking for HA systems\n- Diskdump -- allow partial diskdumps and directing to swap\n\nThere were several bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 4. \n\nThe following security bugs were fixed in this update, detailed below with\ncorresponding CAN names available from the Common Vulnerabilities and\nExposures project (cve.mitre.org):\n\n- flaws in ptrace() syscall handling on 64-bit systems that allowed a local\nuser to cause a denial of service (crash) (CAN-2005-0756, CAN-2005-1761,\nCAN-2005-1762, CAN-2005-1763)\n\n- flaws in IPSEC network handling that allowed a local user to cause a\ndenial of service or potentially gain privileges (CAN-2005-2456, CAN-2005-2555)\n\n- a flaw in sendmsg() syscall handling on 64-bit systems that allowed a\nlocal user to cause a denial of service or potentially gain privileges\n(CAN-2005-2490)\n\n- a flaw in sendmsg() syscall handling that allowed a local user to cause a\ndenial of service by altering hardware state (CAN-2005-2492)\n\n- a flaw that prevented the topdown allocator from allocating mmap areas\nall the way down to address zero (CAN-2005-1265)\n\n- flaws dealing with keyrings that could cause a local denial of service\n(CAN-2005-2098, CAN-2005-2099)\n\n- a flaw in the 4GB split patch that could allow a local denial of service\n(CAN-2005-2100)\n\n- a xattr sharing bug in the ext2 and ext3 file systems that could cause\ndefault ACLs to disappear (CAN-2005-2801)\n\n- a flaw in the ipt_recent module on 64-bit architectures which could allow\na remote denial of service (CAN-2005-2872)\n\nThe following device drivers have been upgraded to new versions:\n\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla2200 --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla2300 --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla2xxx --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla6312 --------- 8.00.00b21-k to 8.01.00b5-rh2\nmegaraid_mbox --- 2.20.4.5 to 2.20.4.6\nmegaraid_mm ----- 2.20.2.5 to 2.20.2.6 \nlpfc ------------ 0:8.0.16.6_x2 to 0:8.0.16.17\ncciss ----------- 2.6.4 to 2.6.6\nipw2100 --------- 1.0.3 to 1.1.0\ntg3 ------------- 3.22-rh to 3.27-rh\ne100 ------------ 3.3.6-k2-NAPI to 3.4.8-k2-NAPI\ne1000 ----------- 5.6.10.1-k2-NAPI to 6.0.54-k2-NAPI\n3c59x ----------- LK1.1.19\nmptbase --------- 3.01.16 to 3.02.18\nixgb ------------ 1.0.66 to 1.0.95-k2-NAPI\nlibata ---------- 1.10 to 1.11\nsata_via -------- 1.0 to 1.1\nsata_ahci ------- 1.00 to 1.01\nsata_qstor ------ 0.04\nsata_sil -------- 0.8 to 0.9\nsata_svw -------- 1.05 to 1.06\ns390: crypto ---- 1.31 to 1.57\ns390: zfcp ------ \ns390: CTC-MPC ---\ns390: dasd -------\ns390: cio -------\ns390: qeth ------\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:514", "url": "https://access.redhat.com/errata/RHSA-2005:514" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "114578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=114578" }, { "category": "external", "summary": "130914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130914" }, { "category": "external", "summary": "134790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134790" }, { "category": "external", "summary": "135669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135669" }, { "category": "external", "summary": "137343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137343" }, { "category": "external", "summary": "140002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=140002" }, { "category": "external", "summary": "141783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=141783" }, { "category": "external", "summary": "142989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142989" }, { "category": "external", "summary": "144668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144668" }, { "category": "external", "summary": "145575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145575" }, { "category": "external", "summary": "145648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145648" }, { "category": "external", "summary": "145659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145659" }, { "category": "external", "summary": "145976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145976" }, { "category": "external", "summary": "146187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146187" }, { "category": "external", "summary": "147233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147233" }, { "category": "external", "summary": "147496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147496" }, { "category": "external", "summary": "149478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149478" }, { "category": "external", "summary": "149919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149919" }, { "category": "external", "summary": "149979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149979" }, { "category": "external", "summary": "150152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150152" }, { "category": "external", "summary": "151222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151222" }, { "category": "external", "summary": "151315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151315" }, { "category": "external", "summary": "151323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151323" }, { "category": "external", "summary": "151429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151429" }, { "category": "external", "summary": "152162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152162" }, { "category": "external", "summary": "152440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152440" }, { "category": "external", "summary": "152619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152619" }, { "category": "external", "summary": "152982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152982" }, { "category": "external", "summary": "154055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154055" }, { "category": "external", "summary": "154100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154100" }, { "category": "external", "summary": "154347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154347" }, { "category": "external", "summary": "154435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154435" }, { "category": "external", "summary": "154442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154442" }, { "category": "external", "summary": "154451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154451" }, { "category": "external", "summary": "154733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154733" }, { "category": "external", "summary": "155278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155278" }, { "category": "external", "summary": "155344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155344" }, { "category": "external", "summary": "155354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155354" }, { "category": "external", "summary": "155706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155706" }, { "category": "external", "summary": "155932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155932" }, { "category": "external", "summary": "156010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156010" }, { "category": "external", "summary": "156705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156705" }, { "category": "external", "summary": "157239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157239" }, { "category": "external", "summary": "157725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157725" }, { "category": "external", "summary": "157900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157900" }, { "category": "external", "summary": "158107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158107" }, { "category": "external", "summary": "158293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158293" }, { "category": "external", "summary": "158878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158878" }, { "category": "external", "summary": "158883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158883" }, { "category": "external", "summary": "158930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158930" }, { "category": "external", "summary": "158974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158974" }, { "category": "external", "summary": "159640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159640" }, { "category": "external", "summary": "159671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159671" }, { "category": "external", "summary": "159739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159739" }, { "category": "external", "summary": "159765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159765" }, { "category": "external", "summary": "159918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159918" }, { "category": "external", "summary": "159921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159921" }, { "category": "external", "summary": "160028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160028" }, { "category": "external", "summary": "160117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160117" }, { "category": "external", "summary": "160518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160518" }, { "category": "external", "summary": "160522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160522" }, { "category": "external", "summary": "160524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160524" }, { "category": "external", "summary": "160526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160526" }, { "category": "external", "summary": "160528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160528" }, { "category": "external", "summary": "160547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160547" }, { "category": "external", "summary": "160548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160548" }, { "category": "external", "summary": "160654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160654" }, { "category": "external", "summary": "160663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160663" }, { "category": "external", "summary": "160812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160812" }, { "category": "external", "summary": "160882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160882" }, { "category": "external", "summary": "161143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161143" }, { "category": "external", "summary": "161156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161156" }, { "category": "external", "summary": "161314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161314" }, { "category": "external", "summary": "161789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161789" }, { "category": "external", "summary": "161995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161995" }, { "category": "external", "summary": "162108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162108" }, { "category": "external", "summary": "162257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162257" }, { "category": "external", "summary": "162548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162548" }, { "category": "external", "summary": "162728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162728" }, { "category": "external", "summary": "163528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163528" }, { "category": "external", "summary": "164094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164094" }, { "category": "external", "summary": "164228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164228" }, { "category": "external", "summary": "164338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164338" }, { "category": "external", "summary": "164449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164449" }, { "category": "external", "summary": "164450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164450" }, { "category": "external", "summary": "164628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164628" }, { "category": "external", "summary": "164630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164630" }, { "category": "external", "summary": "164979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164979" }, { "category": "external", "summary": "164991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164991" }, { "category": "external", "summary": "165127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165127" }, { "category": "external", "summary": "165163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165163" }, { "category": "external", "summary": "165242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165242" }, { "category": "external", "summary": "165384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165384" }, { "category": "external", "summary": "165547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165547" }, { "category": "external", "summary": "165560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165560" }, { "category": "external", "summary": "165717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165717" }, { "category": "external", "summary": "166131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166131" }, { "category": "external", "summary": "166248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166248" }, { "category": "external", "summary": "166830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166830" }, { "category": "external", "summary": "167126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167126" }, { "category": "external", "summary": "167412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167412" }, { "category": "external", "summary": "167668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167668" }, { "category": "external", "summary": "167703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167703" }, { "category": "external", "summary": "167711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167711" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_514.json" } ], "title": "Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2", "tracking": { "current_release_date": "2024-11-05T16:32:17+00:00", "generator": { "date": "2024-11-05T16:32:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2005:514", "initial_release_date": "2005-10-05T12:02:00+00:00", "revision_history": [ { "date": "2005-10-05T12:02:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-10-05T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:32:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-22.EL.i686", "product_id": "kernel-devel-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-22.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-22.EL.i686", "product_id": "kernel-smp-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.i686", "product": { "name": "kernel-0:2.6.9-22.EL.i686", "product_id": "kernel-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-22.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-22.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-22.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-22.EL.ia64", "product_id": "kernel-devel-0:2.6.9-22.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.ia64", "product": { "name": "kernel-0:2.6.9-22.EL.ia64", "product_id": "kernel-0:2.6.9-22.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-22.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-0:2.6.9-22.EL.x86_64", "product_id": "kernel-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-22.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.src", "product": { "name": "kernel-0:2.6.9-22.EL.src", "product_id": "kernel-0:2.6.9-22.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-22.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-22.EL.noarch", "product_id": "kernel-doc-0:2.6.9-22.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-22.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-22.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.ppc64", "product": { "name": "kernel-0:2.6.9-22.EL.ppc64", "product_id": "kernel-0:2.6.9-22.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-22.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-22.EL.s390x", "product_id": "kernel-devel-0:2.6.9-22.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.s390x", "product": { "name": "kernel-0:2.6.9-22.EL.s390x", "product_id": "kernel-0:2.6.9-22.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-22.EL.s390", "product_id": "kernel-devel-0:2.6.9-22.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.s390", "product": { "name": "kernel-0:2.6.9-22.EL.s390", "product_id": "kernel-0:2.6.9-22.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.src" }, "product_reference": "kernel-0:2.6.9-22.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-22.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.src" }, "product_reference": "kernel-0:2.6.9-22.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.src" }, "product_reference": "kernel-0:2.6.9-22.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-22.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.src" }, "product_reference": "kernel-0:2.6.9-22.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-22.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-0756", "discovery_date": "2005-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617571" } ], "notes": [ { "category": "description", "text": "ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0756" }, { "category": "external", "summary": "RHBZ#1617571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617571" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0756", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0756" } ], "release_date": "2005-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1265", "discovery_date": "2005-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617622" } ], "notes": [ { "category": "description", "text": "The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1265" }, { "category": "external", "summary": "RHBZ#1617622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1265", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1265" } ], "release_date": "2005-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1761", "discovery_date": "2005-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617665" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1761" }, { "category": "external", "summary": "RHBZ#1617665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617665" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1761", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1761" } ], "release_date": "2005-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1762", "discovery_date": "2005-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617666" } ], "notes": [ { "category": "description", "text": "The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a \"non-canonical\" address.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1762" }, { "category": "external", "summary": "RHBZ#1617666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617666" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1762", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1762" } ], "release_date": "2005-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1763", "discovery_date": "2005-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617667" } ], "notes": [ { "category": "description", "text": "Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1763" }, { "category": "external", "summary": "RHBZ#1617667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617667" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1763", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1763" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1763", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1763" } ], "release_date": "2005-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2098", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617685" } ], "notes": [ { "category": "description", "text": "The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a denial of service (semaphore hang) via a new session keyring (1) with an empty name string, (2) with a long name string, (3) with the key quota reached, or (4) ENOMEM.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2098" }, { "category": "external", "summary": "RHBZ#1617685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617685" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2098", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2098" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2098", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2098" } ], "release_date": "2005-08-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2099", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617686" } ], "notes": [ { "category": "description", "text": "The Linux kernel before 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote attackers to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes the creation to fail, leading to a null dereference in the keyring destructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2099" }, { "category": "external", "summary": "RHBZ#1617686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2099", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2099" } ], "release_date": "2005-08-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2100", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617687" } ], "notes": [ { "category": "description", "text": "The rw_vm function in usercopy.c in the 4GB split patch for the Linux kernel in Red Hat Enterprise Linux 4 does not perform proper bounds checking, which allows local users to cause a denial of service (crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2100" }, { "category": "external", "summary": "RHBZ#1617687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617687" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2100", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2100" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2100", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2100" } ], "release_date": "2005-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2456", "discovery_date": "2005-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617719" } ], "notes": [ { "category": "description", "text": "Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p-\u003edir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock-\u003esk_policy array.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2456" }, { "category": "external", "summary": "RHBZ#1617719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617719" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2456", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2456" } ], "release_date": "2005-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2490", "discovery_date": "2005-08-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617724" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2490" }, { "category": "external", "summary": "RHBZ#1617724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2490", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2490" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2490", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2490" } ], "release_date": "2005-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2492", "discovery_date": "2005-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617725" } ], "notes": [ { "category": "description", "text": "The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2492" }, { "category": "external", "summary": "RHBZ#1617725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2492", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2492" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2492", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2492" } ], "release_date": "2005-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2555", "discovery_date": "2005-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617734" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2555" }, { "category": "external", "summary": "RHBZ#1617734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2555", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2555" } ], "release_date": "2005-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2801", "discovery_date": "2005-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617759" } ], "notes": [ { "category": "description", "text": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2801" }, { "category": "external", "summary": "RHBZ#1617759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617759" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2801", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801" } ], "release_date": "2005-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2872", "discovery_date": "2005-09-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617761" } ], "notes": [ { "category": "description", "text": "The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2872" }, { "category": "external", "summary": "RHBZ#1617761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2872", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2872" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2872", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2872" } ], "release_date": "2005-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3105", "discovery_date": "2005-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617781" } ], "notes": [ { "category": "description", "text": "The mprotect code (mprotect.c) in Linux 2.6 on Itanium IA64 Montecito processors does not properly maintain cache coherency as required by the architecture, which allows local users to cause a denial of service and possibly corrupt data by modifying PTE protections.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3105" }, { "category": "external", "summary": "RHBZ#1617781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617781" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3105", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3105" } ], "release_date": "2005-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3274", "discovery_date": "2005-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617811" } ], "notes": [ { "category": "description", "text": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3274" }, { "category": "external", "summary": "RHBZ#1617811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617811" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3274", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274" } ], "release_date": "2005-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3275", "discovery_date": "2005-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617812" } ], "notes": [ { "category": "description", "text": "The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3275" }, { "category": "external", "summary": "RHBZ#1617812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617812" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3275", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275" } ], "release_date": "2005-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-4886", "discovery_date": "2005-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "160117" } ], "notes": [ { "category": "description", "text": "The selinux_parse_skb_ipv6 function in security/selinux/hooks.c in the Linux kernel before 2.6.12-rc4 allows remote attackers to cause a denial of service (OOPS) via vectors associated with an incorrect call to the ipv6_skip_exthdr function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Fix ipv6 exthdr bug causing Oops", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4886" }, { "category": "external", "summary": "RHBZ#160117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4886", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4886" } ], "release_date": "2005-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Fix ipv6 exthdr bug causing Oops" }, { "cve": "CVE-2006-5871", "discovery_date": "2006-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618230" } ], "notes": [ { "category": "description", "text": "smbfs in Linux kernel 2.6.8 and other versions, and 2.4.x before 2.4.34, when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified uid, gid and mode settings.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5871" }, { "category": "external", "summary": "RHBZ#1618230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618230" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5871", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5871" } ], "release_date": "2004-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
gsd-2005-3274
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2005-3274", "description": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.", "id": "GSD-2005-3274", "references": [ "https://www.suse.com/security/cve/CVE-2005-3274.html", "https://www.debian.org/security/2005/dsa-922", "https://access.redhat.com/errata/RHSA-2006:0190", "https://access.redhat.com/errata/RHSA-2005:663", "https://access.redhat.com/errata/RHSA-2005:514" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-3274" ], "details": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.", "id": "GSD-2005-3274", "modified": "2023-12-13T01:20:12.735078Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3274", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDKSA-2005:235", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235" }, { "name": "18684", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18684" }, { "name": "18056", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18056" }, { "name": "18977", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18977" }, { "name": "MDKSA-2005:220", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "name": "MDKSA-2006:044", "refsource": "MANDRIVA", "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044" }, { "name": "15528", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15528" }, { "name": "DSA-922", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "FLSA:157459-4", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded" }, { "name": "USN-219-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/219-1/" }, { "name": "RHSA-2006:0190", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=e684f066dff5628bb61ad1912de6e8058b5b4c7d", "refsource": "CONFIRM", "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git;a=commit;h=e684f066dff5628bb61ad1912de6e8058b5b4c7d" }, { "name": "MDKSA-2005:218", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "name": "17826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17826" }, { "name": "http://lkml.org/lkml/2005/6/23/249", "refsource": "CONFIRM", "url": "http://lkml.org/lkml/2005/6/23/249" }, { "name": "http://lkml.org/lkml/2005/6/24/173", "refsource": "CONFIRM", "url": "http://lkml.org/lkml/2005/6/24/173" }, { "name": "oval:org.mitre.oval:def:11723", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723" }, { "name": "FLSA:157459-3", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "RHSA-2005:663", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-663.html" }, { "name": "MDKSA-2005:219", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9E64153-4A9A-448A-9654-5C79B4C86646", "versionEndIncluding": "2.4.31", "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "43EDD335-A1D2-46B5-AED5-066CB1127212", "versionEndExcluding": "2.6.13", "versionStartIncluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired." } ], "id": "CVE-2005-3274", "lastModified": "2024-01-21T01:26:05.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 1.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2005-10-21T01:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch" ], "url": "http://lkml.org/lkml/2005/6/23/249" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch" ], "url": "http://lkml.org/lkml/2005/6/24/173" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/17826" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/18056" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/18684" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/18977" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2005/dsa-922" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:235" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-663.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0190.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/427981/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/15528" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://usn.ubuntu.com/219-1/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.