Action not permitted
Modal body text goes here.
cve-2005-3276
Vulnerability from cvelistv5
Published
2005-10-20 04:00
Modified
2024-08-07 23:10
Severity ?
EPSS score ?
Summary
The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T23:10:07.144Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:9748", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9748" }, { "name": "18056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18056" }, { "name": "MDKSA-2005:220", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "name": "RHSA-2006:0144", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "name": "RHSA-2006:0101", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0101.html" }, { "name": "15527", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/15527" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://lkml.org/lkml/2005/8/3/36" }, { "name": "FLSA:157459-2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "DSA-922", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "USN-219-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/219-1/" }, { "name": "18510", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18510" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1" }, { "name": "MDKSA-2005:218", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "name": "FLSA:157459-1", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "17826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17826" }, { "name": "FLSA:157459-3", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "MDKSA-2005:219", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "name": "19252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19252" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://linux.bkbits.net:8080/linux-2.6/cset%4042e81864gSEM90Oun0jA8dufpM3inw" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-07-27T00:00:00", "descriptions": [ { "lang": "en", "value": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:9748", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9748" }, { "name": "18056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18056" }, { "name": "MDKSA-2005:220", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "name": "RHSA-2006:0144", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "name": "RHSA-2006:0101", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0101.html" }, { "name": "15527", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/15527" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://lkml.org/lkml/2005/8/3/36" }, { "name": "FLSA:157459-2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "DSA-922", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "USN-219-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/219-1/" }, { "name": "18510", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18510" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1" }, { "name": "MDKSA-2005:218", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "name": "FLSA:157459-1", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "17826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17826" }, { "name": "FLSA:157459-3", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "MDKSA-2005:219", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "name": "19252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19252" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://linux.bkbits.net:8080/linux-2.6/cset%4042e81864gSEM90Oun0jA8dufpM3inw" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3276", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:9748", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9748" }, { "name": "18056", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18056" }, { "name": "MDKSA-2005:220", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "name": "RHSA-2006:0144", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "name": "RHSA-2006:0101", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0101.html" }, { "name": "15527", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15527" }, { "name": "http://lkml.org/lkml/2005/8/3/36", "refsource": "CONFIRM", "url": "http://lkml.org/lkml/2005/8/3/36" }, { "name": "FLSA:157459-2", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "DSA-922", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "USN-219-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/219-1/" }, { "name": "18510", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18510" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1", "refsource": "CONFIRM", "url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1" }, { "name": "MDKSA-2005:218", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "name": "FLSA:157459-1", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "17826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17826" }, { "name": "FLSA:157459-3", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "MDKSA-2005:219", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "name": "19252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19252" }, { "name": "http://linux.bkbits.net:8080/linux-2.6/cset@42e81864gSEM90Oun0jA8dufpM3inw", "refsource": "CONFIRM", "url": "http://linux.bkbits.net:8080/linux-2.6/cset@42e81864gSEM90Oun0jA8dufpM3inw" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-3276", "datePublished": "2005-10-20T04:00:00", "dateReserved": "2005-10-20T00:00:00", "dateUpdated": "2024-08-07T23:10:07.144Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-3276\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-10-21T01:02:00.000\",\"lastModified\":\"2023-11-07T01:57:49.440\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:N/A:N\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":2.1},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455E647F-73DD-400A-AA19-3D93FE2E57AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC53528-A67F-42DF-B8DA-778A65893F9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"}]}]}],\"references\":[{\"url\":\"http://linux.bkbits.net:8080/linux-2.6/cset%4042e81864gSEM90Oun0jA8dufpM3inw\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lkml.org/lkml/2005/8/3/36\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/17826\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18056\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18510\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/19252\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2005/dsa-922\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:218\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0101.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0144.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/427980/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/428028/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/428058/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/15527\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9748\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/219-1/\",\"source\":\"cve@mitre.org\"}]}}" } }
rhsa-2006_0101
Vulnerability from csaf_redhat
Published
2006-01-17 08:36
Modified
2024-11-05 16:36
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 4 kernel are now available.
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues
described below:
- a flaw in network IGMP processing that a allowed a remote user on the
local network to cause a denial of service (disabling of multicast reports)
if the system is running multicast applications (CVE-2002-2185, moderate)
- a flaw which allowed a local user to write to firmware on read-only
opened /dev/cdrom devices (CVE-2004-1190, moderate)
- a flaw in gzip/zlib handling internal to the kernel that may allow a
local user to cause a denial of service (crash) (CVE-2005-2458, low)
- a flaw in procfs handling during unloading of modules that allowed a
local user to cause a denial of service or potentially gain privileges
(CVE-2005-2709, moderate)
- a flaw in the SCSI procfs interface that allowed a local user to cause a
denial of service (crash) (CVE-2005-2800, moderate)
- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed
a local user to cause a denial of service (crash) (CVE-2005-3044, important)
- a race condition when threads share memory mapping that allowed local
users to cause a denial of service (deadlock) (CVE-2005-3106, important)
- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that
allowed local users to cause a denial of service (crash) (CVE-2005-3109,
moderate)
- a minor info leak with the get_thread_area() syscall that allowed
a local user to view uninitialized kernel stack data (CVE-2005-3276, low)
- a flaw in mq_open system call that allowed a local user to cause a denial
of service (crash) (CVE-2005-3356, important)
- a flaw in set_mempolicy that allowed a local user on some 64-bit
architectures to cause a denial of service (crash) (CVE-2005-3358, important)
- a flaw in the auto-reap of child processes that allowed a local user to
cause a denial of service (crash) (CVE-2005-3784, important)
- a flaw in the IPv6 flowlabel code that allowed a local user to cause a
denial of service (crash) (CVE-2005-3806, important)
- a flaw in network ICMP processing that allowed a local user to cause
a denial of service (memory exhaustion) (CVE-2005-3848, important)
- a flaw in file lease time-out handling that allowed a local user to cause
a denial of service (log file overflow) (CVE-2005-3857, moderate)
- a flaw in network IPv6 xfrm handling that allowed a local user to
cause a denial of service (memory exhaustion) (CVE-2005-3858, important)
- a flaw in procfs handling that allowed a local user to read kernel memory
(CVE-2005-4605, important)
All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in the Red Hat\nEnterprise Linux 4 kernel are now available. \n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues\ndescribed below:\n\n- a flaw in network IGMP processing that a allowed a remote user on the\nlocal network to cause a denial of service (disabling of multicast reports)\nif the system is running multicast applications (CVE-2002-2185, moderate)\n\n- a flaw which allowed a local user to write to firmware on read-only\nopened /dev/cdrom devices (CVE-2004-1190, moderate) \n\n- a flaw in gzip/zlib handling internal to the kernel that may allow a\nlocal user to cause a denial of service (crash) (CVE-2005-2458, low) \n\n- a flaw in procfs handling during unloading of modules that allowed a\nlocal user to cause a denial of service or potentially gain privileges\n(CVE-2005-2709, moderate)\n\n- a flaw in the SCSI procfs interface that allowed a local user to cause a\ndenial of service (crash) (CVE-2005-2800, moderate)\n\n- a flaw in 32-bit-compat handling of the TIOCGDEV ioctl that allowed\na local user to cause a denial of service (crash) (CVE-2005-3044, important)\n\n- a race condition when threads share memory mapping that allowed local\nusers to cause a denial of service (deadlock) (CVE-2005-3106, important)\n\n- a flaw when trying to mount a non-hfsplus filesystem using hfsplus that\nallowed local users to cause a denial of service (crash) (CVE-2005-3109,\nmoderate)\n\n- a minor info leak with the get_thread_area() syscall that allowed\na local user to view uninitialized kernel stack data (CVE-2005-3276, low) \n\n- a flaw in mq_open system call that allowed a local user to cause a denial\nof service (crash) (CVE-2005-3356, important)\n\n- a flaw in set_mempolicy that allowed a local user on some 64-bit\narchitectures to cause a denial of service (crash) (CVE-2005-3358, important)\n\n- a flaw in the auto-reap of child processes that allowed a local user to\ncause a denial of service (crash) (CVE-2005-3784, important)\n\n- a flaw in the IPv6 flowlabel code that allowed a local user to cause a\ndenial of service (crash) (CVE-2005-3806, important)\n\n- a flaw in network ICMP processing that allowed a local user to cause\na denial of service (memory exhaustion) (CVE-2005-3848, important)\n\n- a flaw in file lease time-out handling that allowed a local user to cause\na denial of service (log file overflow) (CVE-2005-3857, moderate) \n\n- a flaw in network IPv6 xfrm handling that allowed a local user to\ncause a denial of service (memory exhaustion) (CVE-2005-3858, important) \n\n- a flaw in procfs handling that allowed a local user to read kernel memory\n(CVE-2005-4605, important)\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0101", "url": "https://access.redhat.com/errata/RHSA-2006:0101" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "158861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158861" }, { "category": "external", "summary": "165679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165679" }, { "category": "external", "summary": "167696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167696" }, { "category": "external", "summary": "168659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168659" }, { "category": "external", "summary": "168777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168777" }, { "category": "external", "summary": "168924", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168924" }, { "category": "external", "summary": "169130", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169130" }, { "category": "external", "summary": "170262", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170262" }, { "category": "external", "summary": "171002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171002" }, { "category": "external", "summary": "174078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174078" }, { "category": "external", "summary": "174081", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174081" }, { "category": "external", "summary": "174337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174337" }, { "category": "external", "summary": "174343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174343" }, { "category": "external", "summary": "174345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174345" }, { "category": "external", "summary": "174807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174807" }, { "category": "external", "summary": "175683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175683" }, { "category": "external", "summary": "176812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=176812" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0101.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-05T16:36:08+00:00", "generator": { "date": "2024-11-05T16:36:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2006:0101", "initial_release_date": "2006-01-17T08:36:00+00:00", "revision_history": [ { "date": "2006-01-17T08:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-01-17T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:36:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-22.0.2.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.i686", "product_id": "kernel-smp-0:2.6.9-22.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-22.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-22.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-22.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-22.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.0.2.EL.i686", "product": { "name": "kernel-0:2.6.9-22.0.2.EL.i686", "product_id": "kernel-0:2.6.9-22.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.0.2.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.i686", "product_id": "kernel-devel-0:2.6.9-22.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.0.2.EL.ia64", "product": { "name": "kernel-0:2.6.9-22.0.2.EL.ia64", "product_id": "kernel-0:2.6.9-22.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64", "product_id": "kernel-devel-0:2.6.9-22.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-22.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-22.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.0.2.EL.x86_64", "product": { "name": "kernel-0:2.6.9-22.0.2.EL.x86_64", "product_id": "kernel-0:2.6.9-22.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch", "product_id": "kernel-doc-0:2.6.9-22.0.2.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-22.0.2.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-22.0.2.EL.src", "product": { "name": "kernel-0:2.6.9-22.0.2.EL.src", "product_id": "kernel-0:2.6.9-22.0.2.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.0.2.EL.ppc64", "product": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64", "product_id": "kernel-0:2.6.9-22.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.0.2.EL.s390x", "product": { "name": "kernel-0:2.6.9-22.0.2.EL.s390x", "product_id": "kernel-0:2.6.9-22.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x", "product_id": "kernel-devel-0:2.6.9-22.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.0.2.EL.s390", "product": { "name": "kernel-0:2.6.9-22.0.2.EL.s390", "product_id": "kernel-0:2.6.9-22.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390", "product_id": "kernel-devel-0:2.6.9-22.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.0.2.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.src" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.0.2.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.src" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.0.2.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.src" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.0.2.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.src" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.0.2.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.0.2.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-2185", "discovery_date": "2005-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616930" } ], "notes": [ { "category": "description", "text": "The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target\u0027s Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-2185" }, { "category": "external", "summary": "RHBZ#1616930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-2185", "url": "https://www.cve.org/CVERecord?id=CVE-2002-2185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-2185" } ], "release_date": "2002-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1190", "discovery_date": "2004-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617395" } ], "notes": [ { "category": "description", "text": "SUSE Linux before 9.1 and SUSE Linux Enterprise Server before 9 do not properly check commands sent to CD devices that have been opened read-only, which could allow local users to conduct unauthorized write activities to modify the firmware of associated SCSI devices.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1190" }, { "category": "external", "summary": "RHBZ#1617395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617395" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1190", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1190" } ], "release_date": "2004-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2458", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617720" } ], "notes": [ { "category": "description", "text": "inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with \"improper tables\".", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2458" }, { "category": "external", "summary": "RHBZ#1617720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2458", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458" } ], "release_date": "1999-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-2709", "discovery_date": "2005-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617751" } ], "notes": [ { "category": "description", "text": "The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2709" }, { "category": "external", "summary": "RHBZ#1617751", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617751" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2709", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2709" } ], "release_date": "2005-11-08T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2800", "discovery_date": "2005-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617758" } ], "notes": [ { "category": "description", "text": "Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2800" }, { "category": "external", "summary": "RHBZ#1617758", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617758" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2800", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2800" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2800", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2800" } ], "release_date": "2005-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-3044", "discovery_date": "2005-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617776" } ], "notes": [ { "category": "description", "text": "Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3044" }, { "category": "external", "summary": "RHBZ#1617776", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617776" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3044", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3044" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3044", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3044" } ], "release_date": "2005-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3106", "discovery_date": "2005-01-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617782" } ], "notes": [ { "category": "description", "text": "Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3106" }, { "category": "external", "summary": "RHBZ#1617782", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617782" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3106", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3106" } ], "release_date": "2005-01-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3109", "discovery_date": "2005-05-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617786" } ], "notes": [ { "category": "description", "text": "The HFS and HFS+ (hfsplus) modules in Linux 2.6 allow attackers to cause a denial of service (oops) by using hfsplus to mount a filesystem that is not hfsplus.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3109" }, { "category": "external", "summary": "RHBZ#1617786", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617786" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3109", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3109" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3109", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3109" } ], "release_date": "2005-05-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-3276", "discovery_date": "2005-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617813" } ], "notes": [ { "category": "description", "text": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3276" }, { "category": "external", "summary": "RHBZ#1617813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3276", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3276" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276" } ], "release_date": "2005-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-3356", "discovery_date": "2005-09-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617817" } ], "notes": [ { "category": "description", "text": "The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice (\"double decrement\") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3356" }, { "category": "external", "summary": "RHBZ#1617817", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617817" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3356", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3356" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3356", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3356" } ], "release_date": "2006-01-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3358", "discovery_date": "2005-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617819" } ], "notes": [ { "category": "description", "text": "Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3358" }, { "category": "external", "summary": "RHBZ#1617819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617819" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3358", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3358" } ], "release_date": "2005-12-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3784", "discovery_date": "2005-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617839" } ], "notes": [ { "category": "description", "text": "The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3784" }, { "category": "external", "summary": "RHBZ#1617839", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617839" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3784", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3784" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3784", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3784" } ], "release_date": "2005-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3806", "discovery_date": "2005-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617840" } ], "notes": [ { "category": "description", "text": "The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3806" }, { "category": "external", "summary": "RHBZ#1617840", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617840" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3806", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3806" } ], "release_date": "2005-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3848", "discovery_date": "2005-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617841" } ], "notes": [ { "category": "description", "text": "Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka \"DST leak in icmp_push_reply.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3848" }, { "category": "external", "summary": "RHBZ#1617841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3848", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3848" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3848", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3848" } ], "release_date": "2005-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3857", "discovery_date": "2005-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617842" } ], "notes": [ { "category": "description", "text": "The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3857" }, { "category": "external", "summary": "RHBZ#1617842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3857", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3857" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3857", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3857" } ], "release_date": "2005-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-3858", "discovery_date": "2005-11-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617843" } ], "notes": [ { "category": "description", "text": "Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3858" }, { "category": "external", "summary": "RHBZ#1617843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3858", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3858" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3858", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3858" } ], "release_date": "2005-08-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-4605", "discovery_date": "2005-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617860" } ], "notes": [ { "category": "description", "text": "The procfs code (proc_misc.c) in Linux 2.6.14.3 and other versions before 2.6.15 allows attackers to read sensitive kernel memory via unspecified vectors in which a signed value is added to an unsigned value.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4605" }, { "category": "external", "summary": "RHBZ#1617860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4605", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4605" } ], "release_date": "2005-12-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-01-17T08:36:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-0:2.6.9-22.0.2.EL.src", "4AS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-0:2.6.9-22.0.2.EL.src", "4Desktop:kernel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-0:2.6.9-22.0.2.EL.src", "4ES:kernel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-0:2.6.9-22.0.2.EL.src", "4WS:kernel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.0.2.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-0:2.6.9-22.0.2.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0101" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2006_0144
Vulnerability from csaf_redhat
Published
2006-03-15 14:05
Modified
2024-11-05 16:35
Summary
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7
Notes
Topic
Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 3. This is the seventh
regular update.
This security advisory has been rated as having moderate security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
This is the seventh regular kernel update to Red Hat Enterprise Linux 3.
New features introduced by this update include:
- addition of the bnx2, dell_rbu, and megaraid_sas device drivers
- support for multi-core, multi-threaded Intel Itanium processors
- upgrade of the SATA subsystem to include ATAPI and SMART support
- optional tuning via the new numa_memory_allocator, arp_announce,
and printk_ratelimit sysctls
There were many bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement in
the reliability and scalability of Red Hat Enterprise Linux 3.
There were numerous driver updates and security fixes (elaborated below).
Other key areas affected by fixes in this update include the networking
subsystem, the VM subsystem, NPTL handling, autofs4, the USB subsystem,
CPU enumeration, and 32-bit-exec-mode handling on 64-bit architectures.
The following device drivers have been upgraded to new versions:
aacraid -------- 1.1.5-2412
bnx2 ----------- 1.4.30 (new)
dell_rbu ------- 2.1 (new)
e1000 ---------- 6.1.16-k3
emulex --------- 7.3.3
fusion --------- 2.06.16.02
ipmi ----------- 35.11
megaraid2 ------ v2.10.10.1
megaraid_sas --- 00.00.02.00 (new)
tg3 ------------ 3.43RH
The following security bugs were fixed in this update:
- a flaw in gzip/zlib handling internal to the kernel that allowed
a local user to cause a denial of service (crash)
(CVE-2005-2458,low)
- a flaw in ext3 EA/ACL handling of attribute sharing that allowed
a local user to gain privileges (CVE-2005-2801, moderate)
- a minor info leak with the get_thread_area() syscall that allowed
a local user to view uninitialized kernel stack data
(CVE-2005-3276, low)
Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.
All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing support and\nmaintenance of Red Hat Enterprise Linux version 3. This is the seventh\nregular update.\n\nThis security advisory has been rated as having moderate security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the seventh regular kernel update to Red Hat Enterprise Linux 3.\n\nNew features introduced by this update include:\n\n - addition of the bnx2, dell_rbu, and megaraid_sas device drivers\n - support for multi-core, multi-threaded Intel Itanium processors\n - upgrade of the SATA subsystem to include ATAPI and SMART support\n - optional tuning via the new numa_memory_allocator, arp_announce,\n and printk_ratelimit sysctls\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement in\nthe reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated below).\nOther key areas affected by fixes in this update include the networking\nsubsystem, the VM subsystem, NPTL handling, autofs4, the USB subsystem,\nCPU enumeration, and 32-bit-exec-mode handling on 64-bit architectures.\n\nThe following device drivers have been upgraded to new versions:\n\n aacraid -------- 1.1.5-2412\n bnx2 ----------- 1.4.30 (new)\n dell_rbu ------- 2.1 (new)\n e1000 ---------- 6.1.16-k3\n emulex --------- 7.3.3\n fusion --------- 2.06.16.02\n ipmi ----------- 35.11\n megaraid2 ------ v2.10.10.1\n megaraid_sas --- 00.00.02.00 (new)\n tg3 ------------ 3.43RH\n\nThe following security bugs were fixed in this update:\n\n - a flaw in gzip/zlib handling internal to the kernel that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-2458,low)\n\n - a flaw in ext3 EA/ACL handling of attribute sharing that allowed\n a local user to gain privileges (CVE-2005-2801, moderate)\n\n - a minor info leak with the get_thread_area() syscall that allowed\n a local user to view uninitialized kernel stack data\n (CVE-2005-3276, low)\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0144", "url": "https://access.redhat.com/errata/RHSA-2006:0144" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "112004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112004" }, { "category": "external", "summary": "112066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112066" }, { "category": "external", "summary": "117067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=117067" }, { "category": "external", "summary": "122256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=122256" }, { "category": "external", "summary": "125642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=125642" }, { "category": "external", "summary": "128015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=128015" }, { "category": "external", "summary": "129265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129265" }, { "category": "external", "summary": "130387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130387" }, { "category": "external", "summary": "130489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130489" }, { "category": "external", "summary": "130712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130712" }, { "category": "external", "summary": "131295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131295" }, { "category": "external", "summary": "132547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=132547" }, { "category": "external", "summary": "134506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134506" }, { "category": "external", "summary": "136583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=136583" }, { "category": "external", "summary": "137101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137101" }, { "category": "external", "summary": "137344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137344" }, { "category": "external", "summary": "137998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137998" }, { "category": "external", "summary": "138730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138730" }, { "category": "external", "summary": "142579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142579" }, { "category": "external", "summary": "144033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144033" }, { "category": "external", "summary": "145596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145596" }, { "category": "external", "summary": "146663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146663" }, { "category": "external", "summary": "147870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147870" }, { "category": "external", "summary": "150559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150559" }, { "category": "external", "summary": "152103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152103" }, { "category": "external", "summary": "152650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152650" }, { "category": "external", "summary": "154028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154028" }, { "category": "external", "summary": "154385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154385" }, { "category": "external", "summary": "156396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156396" }, { "category": "external", "summary": "156397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156397" }, { "category": "external", "summary": "156645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156645" }, { "category": "external", "summary": "156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156987" }, { "category": "external", "summary": "156988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156988" }, { "category": "external", "summary": "156999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156999" }, { "category": "external", "summary": "157006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157006" }, { "category": "external", "summary": "158819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158819" }, { "category": "external", "summary": "158821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158821" }, { "category": "external", "summary": "159326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159326" }, { "category": "external", "summary": "159523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159523" }, { "category": "external", "summary": "159874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159874" }, { "category": "external", "summary": "159977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159977" }, { "category": "external", "summary": "160009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160009" }, { "category": "external", "summary": "160337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160337" }, { "category": "external", "summary": "160539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160539" }, { "category": "external", "summary": "161056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161056" }, { "category": "external", "summary": "161160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161160" }, { "category": "external", "summary": "161188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161188" }, { "category": "external", "summary": "161336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161336" }, { "category": "external", "summary": "161866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161866" }, { "category": "external", "summary": "161875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161875" }, { "category": "external", "summary": "162065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162065" }, { "category": "external", "summary": "162212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162212" }, { "category": "external", "summary": "162271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162271" }, { "category": "external", "summary": "162417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162417" }, { "category": "external", "summary": "162683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162683" }, { "category": "external", "summary": "162735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162735" }, { "category": "external", "summary": "163176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163176" }, { "category": "external", "summary": "163184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163184" }, { "category": "external", "summary": "163239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163239" }, { "category": "external", "summary": "163307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163307" }, { "category": "external", "summary": "163381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163381" }, { "category": "external", "summary": "163901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163901" }, { "category": "external", "summary": "163929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163929" }, { "category": "external", "summary": "164206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164206" }, { "category": "external", "summary": "164304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164304" }, { "category": "external", "summary": "164438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164438" }, { "category": "external", "summary": "164580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164580" }, { "category": "external", "summary": "164795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164795" }, { "category": "external", "summary": "164828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164828" }, { "category": "external", "summary": "165006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165006" }, { "category": "external", "summary": "165119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165119" }, { "category": "external", "summary": "165364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165364" }, { "category": "external", "summary": "165412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165412" }, { "category": "external", "summary": "165453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165453" }, { "category": "external", "summary": "165475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165475" }, { "category": "external", "summary": "165680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165680" }, { "category": "external", "summary": "165825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165825" }, { "category": "external", "summary": "165989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165989" }, { "category": "external", "summary": "166345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166345" }, { "category": "external", "summary": "166363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166363" }, { "category": "external", "summary": "166364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166364" }, { "category": "external", "summary": "166578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166578" }, { "category": "external", "summary": "166583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166583" }, { "category": "external", "summary": "166600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166600" }, { "category": "external", "summary": "166669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166669" }, { "category": "external", "summary": "167674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167674" }, { "category": "external", "summary": "167800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167800" }, { "category": "external", "summary": "167942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167942" }, { "category": "external", "summary": "168226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168226" }, { "category": "external", "summary": "168293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168293" }, { "category": "external", "summary": "168315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168315" }, { "category": "external", "summary": "168358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168358" }, { "category": "external", "summary": "168359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168359" }, { "category": "external", "summary": "168390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168390" }, { "category": "external", "summary": "168392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168392" }, { "category": "external", "summary": "168474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168474" }, { "category": "external", "summary": "168541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168541" }, { "category": "external", "summary": "168581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168581" }, { "category": "external", "summary": "168597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168597" }, { "category": "external", "summary": "168603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168603" }, { "category": "external", "summary": "168681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168681" }, { "category": "external", "summary": "168780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168780" }, { "category": "external", "summary": "168795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168795" }, { "category": "external", "summary": "168896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168896" }, { "category": "external", "summary": "169230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169230" }, { "category": "external", "summary": "169294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169294" }, { "category": "external", "summary": "169393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169393" }, { "category": "external", "summary": "169511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169511" }, { "category": "external", "summary": "169662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169662" }, { "category": "external", "summary": "169992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169992" }, { "category": "external", "summary": "170429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170429" }, { "category": "external", "summary": "170440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170440" }, { "category": "external", "summary": "170446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170446" }, { "category": "external", "summary": "170529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170529" }, { "category": "external", "summary": "170561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170561" }, { "category": "external", "summary": "170633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170633" }, { "category": "external", "summary": "171129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171129" }, { "category": "external", "summary": "171377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171377" }, { "category": "external", "summary": "172233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172233" }, { "category": "external", "summary": "172334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172334" }, { "category": "external", "summary": "172664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172664" }, { "category": "external", "summary": "173280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=173280" }, { "category": "external", "summary": "174005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174005" }, { "category": "external", "summary": "175017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175017" }, { "category": "external", "summary": "175154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175154" }, { "category": "external", "summary": "175211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175211" }, { "category": "external", "summary": "175365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175365" }, { "category": "external", "summary": "175624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175624" }, { "category": "external", "summary": "175625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175625" }, { "category": "external", "summary": "175767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175767" }, { "category": "external", "summary": "176264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=176264" }, { "category": "external", "summary": "177023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=177023" }, { "category": "external", "summary": "177573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=177573" }, { "category": "external", "summary": "177691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=177691" }, { "category": "external", "summary": "179168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=179168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0144.json" } ], "title": "Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7", "tracking": { "current_release_date": "2024-11-05T16:35:50+00:00", "generator": { "date": "2024-11-05T16:35:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2006:0144", "initial_release_date": "2006-03-15T14:05:00+00:00", "revision_history": [ { "date": "2006-03-15T14:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-03-15T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T16:35:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-40.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-40.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.i386", "product": { "name": "kernel-source-0:2.4.21-40.EL.i386", "product_id": "kernel-source-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-40.EL.i386", "product_id": "kernel-doc-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-40.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.i686", "product": { "name": "kernel-0:2.4.21-40.EL.i686", "product_id": "kernel-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-40.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-40.EL.i686", "product_id": "kernel-smp-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-40.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-0:2.4.21-40.EL.athlon", "product_id": "kernel-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-40.EL.athlon", "product_id": "kernel-smp-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-40.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-0:2.4.21-40.EL.ia64", "product_id": "kernel-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-40.EL.ia64", "product_id": "kernel-source-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-40.EL.ia64", "product_id": "kernel-doc-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ia32e", "product": { "name": "kernel-0:2.4.21-40.EL.ia32e", "product_id": "kernel-0:2.4.21-40.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-0:2.4.21-40.EL.x86_64", "product_id": "kernel-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-40.EL.x86_64", "product_id": "kernel-source-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.src", "product": { "name": "kernel-0:2.4.21-40.EL.src", "product_id": "kernel-0:2.4.21-40.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-0:2.4.21-40.EL.s390x", "product_id": "kernel-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-40.EL.s390x", "product_id": "kernel-source-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-40.EL.s390x", "product_id": "kernel-doc-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.s390", "product": { "name": "kernel-0:2.4.21-40.EL.s390", "product_id": "kernel-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.s390", "product": { "name": "kernel-source-0:2.4.21-40.EL.s390", "product_id": "kernel-source-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-40.EL.s390", "product_id": "kernel-doc-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-40.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-40.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-40.EL.ppc64", "product_id": "kernel-source-0:2.4.21-40.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-40.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-2458", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617720" } ], "notes": [ { "category": "description", "text": "inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with \"improper tables\".", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2458" }, { "category": "external", "summary": "RHBZ#1617720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2458", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458" } ], "release_date": "1999-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-2801", "discovery_date": "2005-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617759" } ], "notes": [ { "category": "description", "text": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2801" }, { "category": "external", "summary": "RHBZ#1617759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617759" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2801", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801" } ], "release_date": "2005-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-3276", "discovery_date": "2005-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617813" } ], "notes": [ { "category": "description", "text": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3276" }, { "category": "external", "summary": "RHBZ#1617813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3276", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3276" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276" } ], "release_date": "2005-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-4798", "discovery_date": "2005-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617863" } ], "notes": [ { "category": "description", "text": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4798" }, { "category": "external", "summary": "RHBZ#1617863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4798", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4798" } ], "release_date": "2005-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
gsd-2005-3276
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2005-3276", "description": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.", "id": "GSD-2005-3276", "references": [ "https://www.suse.com/security/cve/CVE-2005-3276.html", "https://www.debian.org/security/2005/dsa-922", "https://access.redhat.com/errata/RHSA-2006:0144", "https://access.redhat.com/errata/RHSA-2006:0101" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-3276" ], "details": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.", "id": "GSD-2005-3276", "modified": "2023-12-13T01:20:13.095226Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3276", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:9748", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9748" }, { "name": "18056", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18056" }, { "name": "MDKSA-2005:220", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "name": "RHSA-2006:0144", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "name": "RHSA-2006:0101", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0101.html" }, { "name": "15527", "refsource": "BID", "url": "http://www.securityfocus.com/bid/15527" }, { "name": "http://lkml.org/lkml/2005/8/3/36", "refsource": "CONFIRM", "url": "http://lkml.org/lkml/2005/8/3/36" }, { "name": "FLSA:157459-2", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "DSA-922", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "USN-219-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/219-1/" }, { "name": "18510", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18510" }, { "name": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1", "refsource": "CONFIRM", "url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1" }, { "name": "MDKSA-2005:218", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "name": "FLSA:157459-1", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "17826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17826" }, { "name": "FLSA:157459-3", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "MDKSA-2005:219", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "name": "19252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19252" }, { "name": "http://linux.bkbits.net:8080/linux-2.6/cset@42e81864gSEM90Oun0jA8dufpM3inw", "refsource": "CONFIRM", "url": "http://linux.bkbits.net:8080/linux-2.6/cset@42e81864gSEM90Oun0jA8dufpM3inw" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-3276" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1" }, { "name": "http://lkml.org/lkml/2005/8/3/36", "refsource": "CONFIRM", "tags": [], "url": "http://lkml.org/lkml/2005/8/3/36" }, { "name": "http://linux.bkbits.net:8080/linux-2.6/cset@42e81864gSEM90Oun0jA8dufpM3inw", "refsource": "CONFIRM", "tags": [], "url": "http://linux.bkbits.net:8080/linux-2.6/cset@42e81864gSEM90Oun0jA8dufpM3inw" }, { "name": "15527", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/15527" }, { "name": "DSA-922", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "18056", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18056" }, { "name": "RHSA-2006:0101", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0101.html" }, { "name": "18510", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18510" }, { "name": "RHSA-2006:0144", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "name": "19252", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/19252" }, { "name": "17826", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/17826" }, { "name": "MDKSA-2005:218", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "name": "MDKSA-2005:220", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "name": "MDKSA-2005:219", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "name": "oval:org.mitre.oval:def:9748", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9748" }, { "name": "USN-219-1", "refsource": "UBUNTU", "tags": [], "url": "https://usn.ubuntu.com/219-1/" }, { "name": "FLSA:157459-2", "refsource": "FEDORA", "tags": [], "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "FLSA:157459-1", "refsource": "FEDORA", "tags": [], "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "FLSA:157459-3", "refsource": "FEDORA", "tags": [], "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-19T15:35Z", "publishedDate": "2005-10-21T01:02Z" } } }
ghsa-pr7v-p4jw-8rhx
Vulnerability from github
Published
2022-05-01 02:16
Modified
2022-05-01 02:16
Details
The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.
{ "affected": [], "aliases": [ "CVE-2005-3276" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-10-21T01:02:00Z", "severity": "LOW" }, "details": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.", "id": "GHSA-pr7v-p4jw-8rhx", "modified": "2022-05-01T02:16:18Z", "published": "2022-05-01T02:16:18Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9748" }, { "type": "WEB", "url": "https://usn.ubuntu.com/219-1" }, { "type": "WEB", "url": "http://linux.bkbits.net:8080/linux-2.6/cset@42e81864gSEM90Oun0jA8dufpM3inw" }, { "type": "WEB", "url": "http://lkml.org/lkml/2005/8/3/36" }, { "type": "WEB", "url": "http://secunia.com/advisories/17826" }, { "type": "WEB", "url": "http://secunia.com/advisories/18056" }, { "type": "WEB", "url": "http://secunia.com/advisories/18510" }, { "type": "WEB", "url": "http://secunia.com/advisories/19252" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-922" }, { "type": "WEB", "url": "http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:218" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:220" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0101.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/15527" } ], "schema_version": "1.4.0", "severity": [] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.