Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2005-4811
Vulnerability from cvelistv5
Published
2006-09-22 21:00
Modified
2024-08-08 00:01
Severity ?
EPSS score ?
Summary
The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:01:23.194Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:10976", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976" }, { "name": "22292", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22292" }, { "name": "RHSA-2006:0689", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0689.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm" }, { "name": "[linux-kernel] 20050805 [PATCH] Fix hugepage crash on failing mmap()", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=112323336017157" }, { "name": "22945", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22945" }, { "name": "DSA-1304", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1304" }, { "name": "25714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/25714" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345" }, { "name": "20362", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20362" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-08-05T00:00:00", "descriptions": [ { "lang": "en", "value": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:10976", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976" }, { "name": "22292", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22292" }, { "name": "RHSA-2006:0689", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0689.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm" }, { "name": "[linux-kernel] 20050805 [PATCH] Fix hugepage crash on failing mmap()", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=112323336017157" }, { "name": "22945", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22945" }, { "name": "DSA-1304", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1304" }, { "name": "25714", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/25714" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345" }, { "name": "20362", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20362" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:10976", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976" }, { "name": "22292", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22292" }, { "name": "RHSA-2006:0689", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0689.html" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm" }, { "name": "[linux-kernel] 20050805 [PATCH] Fix hugepage crash on failing mmap()", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=112323336017157" }, { "name": "22945", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22945" }, { "name": "DSA-1304", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1304" }, { "name": "25714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25714" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345" }, { "name": "20362", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20362" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-4811", "datePublished": "2006-09-22T21:00:00", "dateReserved": "2006-09-22T00:00:00", "dateUpdated": "2024-08-08T00:01:23.194Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\", \"matchCriteriaId\": \"2255842B-34CD-4062-886C-37161A065703\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0ED322D-004C-472E-A37F-89B78C55FE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\", \"matchCriteriaId\": \"412F7334-C46B-4F61-B38A-2CA56B498151\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\", \"matchCriteriaId\": \"5967AF83-798D-4B1E-882A-5737FFC859C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A90D2123-D55B-4104-8D82-5B6365AA3B77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCCDFD49-D402-420E-92F5-20445A0FE139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\", \"matchCriteriaId\": \"8877D178-1655-46E9-8F5A-2DD576601F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\", \"matchCriteriaId\": \"8358E965-3689-4B05-8470-C4A1463FA0E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8220D81-9065-471F-9256-CFE7B9941555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C14A949-E2B8-4100-8ED4-645CB996B08A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB445E3E-CCBD-4737-BE30-841B9A79D558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5301E27-8021-467C-A9A2-AF2137EF0299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79787868-2D77-4B55-AD61-C2B357CCE047\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0934C49-5F88-4189-BD88-2F32C39C2F25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"14B0A230-4054-4483-A3A7-9A5A286C7552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F90242EF-048B-4539-AA41-87AA84875A9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C4E9325-2A70-4E15-9AAF-5588BF218055\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"01402A85-B681-4DE0-B7BB-F52567DA29E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FC53528-A67F-42DF-B8DA-778A65893F9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B130EB7-A951-4717-A906-E2F602F7B69F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D90502F-EC45-4ADC-9428-B94346DA660B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2422569B-02ED-4028-83D8-D778657596B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E66E4653-1A55-4827-888B-E0776E32ED28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5738D628-0B2D-4F56-9427-2009BFCB6C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"169446DE-67F8-4738-91FE-ED8058118F80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"860F9225-8A3F-492C-B72B-5EFFB322802C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E23724-2CA4-4211-BB83-38661BE7E6AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"298266AB-2A36-4606-BF80-2185FC56C4D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C2658CA-56C2-494F-AC42-618EC413CBDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD34526D-F2CC-44C5-991D-B1E41C327860\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.\"}]", "id": "CVE-2005-4811", "lastModified": "2024-11-21T00:05:14.387", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 4.9, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2005-12-31T05:00:00.000", "references": "[{\"url\": \"http://marc.info/?l=linux-kernel\u0026m=112323336017157\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/22292\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/22945\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/25714\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2007/dsa-1304\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0689.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/20362\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=linux-kernel\u0026m=112323336017157\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/22292\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/22945\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/25714\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2007/dsa-1304\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2006-0689.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/20362\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2005-4811\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-12-31T05:00:00.000\",\"lastModified\":\"2024-11-21T00:05:14.387\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2255842B-34CD-4062-886C-37161A065703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0ED322D-004C-472E-A37F-89B78C55FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"412F7334-C46B-4F61-B38A-2CA56B498151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5967AF83-798D-4B1E-882A-5737FFC859C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90D2123-D55B-4104-8D82-5B6365AA3B77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCDFD49-D402-420E-92F5-20445A0FE139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8877D178-1655-46E9-8F5A-2DD576601F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8358E965-3689-4B05-8470-C4A1463FA0E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C14A949-E2B8-4100-8ED4-645CB996B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0934C49-5F88-4189-BD88-2F32C39C2F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B0A230-4054-4483-A3A7-9A5A286C7552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F90242EF-048B-4539-AA41-87AA84875A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4E9325-2A70-4E15-9AAF-5588BF218055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"01402A85-B681-4DE0-B7BB-F52567DA29E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC53528-A67F-42DF-B8DA-778A65893F9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B130EB7-A951-4717-A906-E2F602F7B69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2422569B-02ED-4028-83D8-D778657596B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66E4653-1A55-4827-888B-E0776E32ED28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"169446DE-67F8-4738-91FE-ED8058118F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=112323336017157\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22292\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/22945\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25714\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1304\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0689.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/20362\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=112323336017157\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22292\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/22945\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25714\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1304\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0689.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/20362\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-gj3q-qghf-gf7p
Vulnerability from github
Published
2022-05-01 02:31
Modified
2022-05-01 02:31
Details
The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.
{ "affected": [], "aliases": [ "CVE-2005-4811" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-12-31T05:00:00Z", "severity": "MODERATE" }, "details": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.", "id": "GHSA-gj3q-qghf-gf7p", "modified": "2022-05-01T02:31:01Z", "published": "2022-05-01T02:31:01Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4811" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=112323336017157" }, { "type": "WEB", "url": "http://secunia.com/advisories/22292" }, { "type": "WEB", "url": "http://secunia.com/advisories/22945" }, { "type": "WEB", "url": "http://secunia.com/advisories/25714" }, { "type": "WEB", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm" }, { "type": "WEB", "url": "http://www.debian.org/security/2007/dsa-1304" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0689.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/20362" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2006_0689
Vulnerability from csaf_redhat
Published
2006-10-05 19:16
Modified
2024-11-22 00:39
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 4 kernel are now available.
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described
below:
* a flaw in the SCTP support that allowed a local user to cause a denial of
service (crash) with a specific SO_LINGER value. (CVE-2006-4535, Important)
* a flaw in the hugepage table support that allowed a local user to cause a
denial of service (crash). (CVE-2005-4811, Important)
* a flaw in the mprotect system call that allowed setting write permission
for a read-only attachment of shared memory. (CVE-2006-2071, Moderate)
* a flaw in HID0[31] (en_attn) register handling on PowerPC 970 systems
that allowed a local user to cause a denial of service. (crash)
(CVE-2006-4093, Moderate)
* a flaw in the perfmon support of Itanium systems that allowed a local
user to cause a denial of service by consuming all file descriptors.
(CVE-2006-3741, Moderate)
* a flaw in the ATM subsystem. On systems with installed ATM hardware and
configured ATM support, a remote user could cause a denial of service
(panic) by accessing socket buffers memory after freeing them.
(CVE-2006-4997, Moderate)
* a flaw in the DVB subsystem. On systems with installed DVB hardware and
configured DVB support, a remote user could cause a denial of service
(panic) by sending a ULE SNDU packet with length of 0. (CVE-2006-4623, Low)
* an information leak in the network subsystem that possibly allowed a
local user to read sensitive data from kernel memory. (CVE-2006-0039, Low)
In addition, two bugfixes for the IPW-2200 wireless driver were included.
The first one ensures that wireless management applications correctly
identify IPW-2200 controlled devices, while the second fix ensures that
DHCP requests using the IPW-2200 operate correctly.
Red Hat would like to thank Olof Johansson, Stephane Eranian and Solar
Designer for reporting issues fixed in this erratum.
All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in the Red Hat\nEnterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues described\nbelow:\n\n* a flaw in the SCTP support that allowed a local user to cause a denial of\nservice (crash) with a specific SO_LINGER value. (CVE-2006-4535, Important)\n\n* a flaw in the hugepage table support that allowed a local user to cause a\ndenial of service (crash). (CVE-2005-4811, Important)\n\n* a flaw in the mprotect system call that allowed setting write permission\nfor a read-only attachment of shared memory. (CVE-2006-2071, Moderate)\n\n* a flaw in HID0[31] (en_attn) register handling on PowerPC 970 systems\nthat allowed a local user to cause a denial of service. (crash)\n(CVE-2006-4093, Moderate)\n\n* a flaw in the perfmon support of Itanium systems that allowed a local\nuser to cause a denial of service by consuming all file descriptors.\n(CVE-2006-3741, Moderate)\n\n* a flaw in the ATM subsystem. On systems with installed ATM hardware and\nconfigured ATM support, a remote user could cause a denial of service\n(panic) by accessing socket buffers memory after freeing them.\n(CVE-2006-4997, Moderate)\n\n* a flaw in the DVB subsystem. On systems with installed DVB hardware and\nconfigured DVB support, a remote user could cause a denial of service\n(panic) by sending a ULE SNDU packet with length of 0. (CVE-2006-4623, Low)\n\n* an information leak in the network subsystem that possibly allowed a\nlocal user to read sensitive data from kernel memory. (CVE-2006-0039, Low)\n\nIn addition, two bugfixes for the IPW-2200 wireless driver were included.\nThe first one ensures that wireless management applications correctly\nidentify IPW-2200 controlled devices, while the second fix ensures that\nDHCP requests using the IPW-2200 operate correctly.\n\nRed Hat would like to thank Olof Johansson, Stephane Eranian and Solar\nDesigner for reporting issues fixed in this erratum.\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0689", "url": "https://access.redhat.com/errata/RHSA-2006:0689" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "165345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165345" }, { "category": "external", "summary": "190073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190073" }, { "category": "external", "summary": "191698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=191698" }, { "category": "external", "summary": "198820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198820" }, { "category": "external", "summary": "201684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=201684" }, { "category": "external", "summary": "203421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=203421" }, { "category": "external", "summary": "204360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=204360" }, { "category": "external", "summary": "204460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=204460" }, { "category": "external", "summary": "204912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=204912" }, { "category": "external", "summary": "206265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=206265" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0689.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T00:39:11+00:00", "generator": { "date": "2024-11-22T00:39:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0689", "initial_release_date": "2006-10-05T19:16:00+00:00", "revision_history": [ { "date": "2006-10-05T19:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-10-05T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:39:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-42.0.3.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.3.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.3.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.src", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.src", "product_id": "kernel-0:2.6.9-42.0.3.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "product_id": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-42.0.3.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.3.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.s390x", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x", "product_id": "kernel-0:2.6.9-42.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.s390", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.s390", "product_id": "kernel-0:2.6.9-42.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-4811", "discovery_date": "2005-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617864" } ], "notes": [ { "category": "description", "text": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4811" }, { "category": "external", "summary": "RHBZ#1617864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4811", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4811" } ], "release_date": "2005-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Solar Designer" ] } ], "cve": "CVE-2006-0039", "discovery_date": "2006-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617869" } ], "notes": [ { "category": "description", "text": "Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0039" }, { "category": "external", "summary": "RHBZ#1617869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617869" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0039", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0039" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0039", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0039" } ], "release_date": "2006-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-2071", "discovery_date": "2006-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618086" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2071" }, { "category": "external", "summary": "RHBZ#1618086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618086" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2071", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2071" } ], "release_date": "2006-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Stephane Eranian" ] } ], "cve": "CVE-2006-3741", "discovery_date": "2006-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618157" } ], "notes": [ { "category": "description", "text": "The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3741" }, { "category": "external", "summary": "RHBZ#1618157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3741", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3741" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3741", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3741" } ], "release_date": "2006-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Olof Johansson" ] } ], "cve": "CVE-2006-4093", "discovery_date": "2006-08-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618175" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.x.6 before 2.6.17.9 and 2.4.x before 2.4.33.1 on PowerPC PPC970 systems allows local users to cause a denial of service (crash) related to the \"HID0 attention enable on PPC970 at boot time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4093" }, { "category": "external", "summary": "RHBZ#1618175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4093", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4093" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4093", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4093" } ], "release_date": "2006-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-4535", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618190" } ], "notes": [ { "category": "description", "text": "The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745. NOTE: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4535" }, { "category": "external", "summary": "RHBZ#1618190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4535", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4535" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4535", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4535" } ], "release_date": "2006-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4623", "discovery_date": "2006-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618199" } ], "notes": [ { "category": "description", "text": "The Unidirectional Lightweight Encapsulation (ULE) decapsulation component in dvb-core/dvb_net.c in the dvb driver in the Linux kernel 2.6.17.8 allows remote attackers to cause a denial of service (crash) via an SNDU length of 0 in a ULE packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 4:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204912\n\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4623" }, { "category": "external", "summary": "RHBZ#1618199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4623", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4623" } ], "release_date": "2006-08-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-4997", "discovery_date": "2006-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618207" } ], "notes": [ { "category": "description", "text": "The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4997" }, { "category": "external", "summary": "RHBZ#1618207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4997", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4997" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4997", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4997" } ], "release_date": "2006-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2006:0689
Vulnerability from csaf_redhat
Published
2006-10-05 19:16
Modified
2024-11-22 00:39
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 4 kernel are now available.
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described
below:
* a flaw in the SCTP support that allowed a local user to cause a denial of
service (crash) with a specific SO_LINGER value. (CVE-2006-4535, Important)
* a flaw in the hugepage table support that allowed a local user to cause a
denial of service (crash). (CVE-2005-4811, Important)
* a flaw in the mprotect system call that allowed setting write permission
for a read-only attachment of shared memory. (CVE-2006-2071, Moderate)
* a flaw in HID0[31] (en_attn) register handling on PowerPC 970 systems
that allowed a local user to cause a denial of service. (crash)
(CVE-2006-4093, Moderate)
* a flaw in the perfmon support of Itanium systems that allowed a local
user to cause a denial of service by consuming all file descriptors.
(CVE-2006-3741, Moderate)
* a flaw in the ATM subsystem. On systems with installed ATM hardware and
configured ATM support, a remote user could cause a denial of service
(panic) by accessing socket buffers memory after freeing them.
(CVE-2006-4997, Moderate)
* a flaw in the DVB subsystem. On systems with installed DVB hardware and
configured DVB support, a remote user could cause a denial of service
(panic) by sending a ULE SNDU packet with length of 0. (CVE-2006-4623, Low)
* an information leak in the network subsystem that possibly allowed a
local user to read sensitive data from kernel memory. (CVE-2006-0039, Low)
In addition, two bugfixes for the IPW-2200 wireless driver were included.
The first one ensures that wireless management applications correctly
identify IPW-2200 controlled devices, while the second fix ensures that
DHCP requests using the IPW-2200 operate correctly.
Red Hat would like to thank Olof Johansson, Stephane Eranian and Solar
Designer for reporting issues fixed in this erratum.
All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in the Red Hat\nEnterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues described\nbelow:\n\n* a flaw in the SCTP support that allowed a local user to cause a denial of\nservice (crash) with a specific SO_LINGER value. (CVE-2006-4535, Important)\n\n* a flaw in the hugepage table support that allowed a local user to cause a\ndenial of service (crash). (CVE-2005-4811, Important)\n\n* a flaw in the mprotect system call that allowed setting write permission\nfor a read-only attachment of shared memory. (CVE-2006-2071, Moderate)\n\n* a flaw in HID0[31] (en_attn) register handling on PowerPC 970 systems\nthat allowed a local user to cause a denial of service. (crash)\n(CVE-2006-4093, Moderate)\n\n* a flaw in the perfmon support of Itanium systems that allowed a local\nuser to cause a denial of service by consuming all file descriptors.\n(CVE-2006-3741, Moderate)\n\n* a flaw in the ATM subsystem. On systems with installed ATM hardware and\nconfigured ATM support, a remote user could cause a denial of service\n(panic) by accessing socket buffers memory after freeing them.\n(CVE-2006-4997, Moderate)\n\n* a flaw in the DVB subsystem. On systems with installed DVB hardware and\nconfigured DVB support, a remote user could cause a denial of service\n(panic) by sending a ULE SNDU packet with length of 0. (CVE-2006-4623, Low)\n\n* an information leak in the network subsystem that possibly allowed a\nlocal user to read sensitive data from kernel memory. (CVE-2006-0039, Low)\n\nIn addition, two bugfixes for the IPW-2200 wireless driver were included.\nThe first one ensures that wireless management applications correctly\nidentify IPW-2200 controlled devices, while the second fix ensures that\nDHCP requests using the IPW-2200 operate correctly.\n\nRed Hat would like to thank Olof Johansson, Stephane Eranian and Solar\nDesigner for reporting issues fixed in this erratum.\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0689", "url": "https://access.redhat.com/errata/RHSA-2006:0689" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "165345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165345" }, { "category": "external", "summary": "190073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190073" }, { "category": "external", "summary": "191698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=191698" }, { "category": "external", "summary": "198820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198820" }, { "category": "external", "summary": "201684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=201684" }, { "category": "external", "summary": "203421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=203421" }, { "category": "external", "summary": "204360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=204360" }, { "category": "external", "summary": "204460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=204460" }, { "category": "external", "summary": "204912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=204912" }, { "category": "external", "summary": "206265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=206265" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0689.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T00:39:11+00:00", "generator": { "date": "2024-11-22T00:39:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0689", "initial_release_date": "2006-10-05T19:16:00+00:00", "revision_history": [ { "date": "2006-10-05T19:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-10-05T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:39:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-42.0.3.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.3.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.3.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.src", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.src", "product_id": "kernel-0:2.6.9-42.0.3.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "product_id": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-42.0.3.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.3.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.s390x", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x", "product_id": "kernel-0:2.6.9-42.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.s390", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.s390", "product_id": "kernel-0:2.6.9-42.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-4811", "discovery_date": "2005-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617864" } ], "notes": [ { "category": "description", "text": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4811" }, { "category": "external", "summary": "RHBZ#1617864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4811", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4811" } ], "release_date": "2005-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Solar Designer" ] } ], "cve": "CVE-2006-0039", "discovery_date": "2006-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617869" } ], "notes": [ { "category": "description", "text": "Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0039" }, { "category": "external", "summary": "RHBZ#1617869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617869" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0039", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0039" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0039", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0039" } ], "release_date": "2006-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-2071", "discovery_date": "2006-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618086" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2071" }, { "category": "external", "summary": "RHBZ#1618086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618086" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2071", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2071" } ], "release_date": "2006-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Stephane Eranian" ] } ], "cve": "CVE-2006-3741", "discovery_date": "2006-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618157" } ], "notes": [ { "category": "description", "text": "The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3741" }, { "category": "external", "summary": "RHBZ#1618157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3741", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3741" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3741", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3741" } ], "release_date": "2006-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Olof Johansson" ] } ], "cve": "CVE-2006-4093", "discovery_date": "2006-08-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618175" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.x.6 before 2.6.17.9 and 2.4.x before 2.4.33.1 on PowerPC PPC970 systems allows local users to cause a denial of service (crash) related to the \"HID0 attention enable on PPC970 at boot time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4093" }, { "category": "external", "summary": "RHBZ#1618175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4093", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4093" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4093", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4093" } ], "release_date": "2006-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-4535", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618190" } ], "notes": [ { "category": "description", "text": "The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745. NOTE: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4535" }, { "category": "external", "summary": "RHBZ#1618190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4535", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4535" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4535", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4535" } ], "release_date": "2006-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4623", "discovery_date": "2006-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618199" } ], "notes": [ { "category": "description", "text": "The Unidirectional Lightweight Encapsulation (ULE) decapsulation component in dvb-core/dvb_net.c in the dvb driver in the Linux kernel 2.6.17.8 allows remote attackers to cause a denial of service (crash) via an SNDU length of 0 in a ULE packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 4:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204912\n\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4623" }, { "category": "external", "summary": "RHBZ#1618199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4623", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4623" } ], "release_date": "2006-08-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-4997", "discovery_date": "2006-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618207" } ], "notes": [ { "category": "description", "text": "The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4997" }, { "category": "external", "summary": "RHBZ#1618207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4997", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4997" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4997", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4997" } ], "release_date": "2006-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
RHSA-2006:0689
Vulnerability from csaf_redhat
Published
2006-10-05 19:16
Modified
2024-11-22 00:39
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix several security issues in the Red Hat
Enterprise Linux 4 kernel are now available.
This security advisory has been rated as having important security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the security issues described
below:
* a flaw in the SCTP support that allowed a local user to cause a denial of
service (crash) with a specific SO_LINGER value. (CVE-2006-4535, Important)
* a flaw in the hugepage table support that allowed a local user to cause a
denial of service (crash). (CVE-2005-4811, Important)
* a flaw in the mprotect system call that allowed setting write permission
for a read-only attachment of shared memory. (CVE-2006-2071, Moderate)
* a flaw in HID0[31] (en_attn) register handling on PowerPC 970 systems
that allowed a local user to cause a denial of service. (crash)
(CVE-2006-4093, Moderate)
* a flaw in the perfmon support of Itanium systems that allowed a local
user to cause a denial of service by consuming all file descriptors.
(CVE-2006-3741, Moderate)
* a flaw in the ATM subsystem. On systems with installed ATM hardware and
configured ATM support, a remote user could cause a denial of service
(panic) by accessing socket buffers memory after freeing them.
(CVE-2006-4997, Moderate)
* a flaw in the DVB subsystem. On systems with installed DVB hardware and
configured DVB support, a remote user could cause a denial of service
(panic) by sending a ULE SNDU packet with length of 0. (CVE-2006-4623, Low)
* an information leak in the network subsystem that possibly allowed a
local user to read sensitive data from kernel memory. (CVE-2006-0039, Low)
In addition, two bugfixes for the IPW-2200 wireless driver were included.
The first one ensures that wireless management applications correctly
identify IPW-2200 controlled devices, while the second fix ensures that
DHCP requests using the IPW-2200 operate correctly.
Red Hat would like to thank Olof Johansson, Stephane Eranian and Solar
Designer for reporting issues fixed in this erratum.
All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in the Red Hat\nEnterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues described\nbelow:\n\n* a flaw in the SCTP support that allowed a local user to cause a denial of\nservice (crash) with a specific SO_LINGER value. (CVE-2006-4535, Important)\n\n* a flaw in the hugepage table support that allowed a local user to cause a\ndenial of service (crash). (CVE-2005-4811, Important)\n\n* a flaw in the mprotect system call that allowed setting write permission\nfor a read-only attachment of shared memory. (CVE-2006-2071, Moderate)\n\n* a flaw in HID0[31] (en_attn) register handling on PowerPC 970 systems\nthat allowed a local user to cause a denial of service. (crash)\n(CVE-2006-4093, Moderate)\n\n* a flaw in the perfmon support of Itanium systems that allowed a local\nuser to cause a denial of service by consuming all file descriptors.\n(CVE-2006-3741, Moderate)\n\n* a flaw in the ATM subsystem. On systems with installed ATM hardware and\nconfigured ATM support, a remote user could cause a denial of service\n(panic) by accessing socket buffers memory after freeing them.\n(CVE-2006-4997, Moderate)\n\n* a flaw in the DVB subsystem. On systems with installed DVB hardware and\nconfigured DVB support, a remote user could cause a denial of service\n(panic) by sending a ULE SNDU packet with length of 0. (CVE-2006-4623, Low)\n\n* an information leak in the network subsystem that possibly allowed a\nlocal user to read sensitive data from kernel memory. (CVE-2006-0039, Low)\n\nIn addition, two bugfixes for the IPW-2200 wireless driver were included.\nThe first one ensures that wireless management applications correctly\nidentify IPW-2200 controlled devices, while the second fix ensures that\nDHCP requests using the IPW-2200 operate correctly.\n\nRed Hat would like to thank Olof Johansson, Stephane Eranian and Solar\nDesigner for reporting issues fixed in this erratum.\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0689", "url": "https://access.redhat.com/errata/RHSA-2006:0689" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "165345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165345" }, { "category": "external", "summary": "190073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=190073" }, { "category": "external", "summary": "191698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=191698" }, { "category": "external", "summary": "198820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=198820" }, { "category": "external", "summary": "201684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=201684" }, { "category": "external", "summary": "203421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=203421" }, { "category": "external", "summary": "204360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=204360" }, { "category": "external", "summary": "204460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=204460" }, { "category": "external", "summary": "204912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=204912" }, { "category": "external", "summary": "206265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=206265" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0689.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T00:39:11+00:00", "generator": { "date": "2024-11-22T00:39:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0689", "initial_release_date": "2006-10-05T19:16:00+00:00", "revision_history": [ { "date": "2006-10-05T19:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-10-05T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:39:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-42.0.3.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-42.0.3.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.3.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-42.0.3.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.3.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.src", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.src", "product_id": "kernel-0:2.6.9-42.0.3.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "product_id": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-42.0.3.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-42.0.3.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.s390x", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x", "product_id": "kernel-0:2.6.9-42.0.3.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "product_id": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-42.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-42.0.3.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-42.0.3.EL.s390", "product": { "name": "kernel-0:2.6.9-42.0.3.EL.s390", "product_id": "kernel-0:2.6.9-42.0.3.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-42.0.3.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.src" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-42.0.3.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-42.0.3.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-4811", "discovery_date": "2005-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617864" } ], "notes": [ { "category": "description", "text": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4811" }, { "category": "external", "summary": "RHBZ#1617864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617864" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4811", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4811" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4811", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4811" } ], "release_date": "2005-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Solar Designer" ] } ], "cve": "CVE-2006-0039", "discovery_date": "2006-01-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617869" } ], "notes": [ { "category": "description", "text": "Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-0039" }, { "category": "external", "summary": "RHBZ#1617869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617869" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-0039", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0039" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-0039", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-0039" } ], "release_date": "2006-05-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-2071", "discovery_date": "2006-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618086" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2071" }, { "category": "external", "summary": "RHBZ#1618086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618086" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2071", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2071" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2071", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2071" } ], "release_date": "2006-04-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Stephane Eranian" ] } ], "cve": "CVE-2006-3741", "discovery_date": "2006-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618157" } ], "notes": [ { "category": "description", "text": "The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-3741" }, { "category": "external", "summary": "RHBZ#1618157", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618157" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-3741", "url": "https://www.cve.org/CVERecord?id=CVE-2006-3741" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3741", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3741" } ], "release_date": "2006-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "acknowledgments": [ { "names": [ "Olof Johansson" ] } ], "cve": "CVE-2006-4093", "discovery_date": "2006-08-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618175" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.x.6 before 2.6.17.9 and 2.4.x before 2.4.33.1 on PowerPC PPC970 systems allows local users to cause a denial of service (crash) related to the \"HID0 attention enable on PPC970 at boot time.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4093" }, { "category": "external", "summary": "RHBZ#1618175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4093", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4093" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4093", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4093" } ], "release_date": "2006-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2006-4535", "discovery_date": "2006-08-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618190" } ], "notes": [ { "category": "description", "text": "The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745. NOTE: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4535" }, { "category": "external", "summary": "RHBZ#1618190", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618190" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4535", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4535" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4535", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4535" } ], "release_date": "2006-08-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2006-4623", "discovery_date": "2006-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618199" } ], "notes": [ { "category": "description", "text": "The Unidirectional Lightweight Encapsulation (ULE) decapsulation component in dvb-core/dvb_net.c in the dvb driver in the Linux kernel 2.6.17.8 allows remote attackers to cause a denial of service (crash) via an SNDU length of 0 in a ULE packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug for Red Hat Enterprise Linux 4:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204912\n\nThis issue does not affect Red Hat Enterprise Linux 2.1 or 3.", "title": "Statement" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4623" }, { "category": "external", "summary": "RHBZ#1618199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618199" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4623", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4623" } ], "release_date": "2006-08-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2006-4997", "discovery_date": "2006-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618207" } ], "notes": [ { "category": "description", "text": "The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-4997" }, { "category": "external", "summary": "RHBZ#1618207", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618207" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-4997", "url": "https://www.cve.org/CVERecord?id=CVE-2006-4997" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-4997", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-4997" } ], "release_date": "2006-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-10-05T19:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via Red Hat Network. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-0:2.6.9-42.0.3.EL.src", "4AS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4AS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-0:2.6.9-42.0.3.EL.src", "4Desktop:kernel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-0:2.6.9-42.0.3.EL.src", "4ES:kernel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4ES:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-0:2.6.9-42.0.3.EL.src", "4WS:kernel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.s390x", "4WS:kernel-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-doc-0:2.6.9-42.0.3.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-0:2.6.9-42.0.3.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-42.0.3.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0689" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
gsd-2005-4811
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2005-4811", "description": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.", "id": "GSD-2005-4811", "references": [ "https://www.suse.com/security/cve/CVE-2005-4811.html", "https://www.debian.org/security/2007/dsa-1304", "https://access.redhat.com/errata/RHSA-2006:0689", "https://linux.oracle.com/cve/CVE-2005-4811.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-4811" ], "details": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.", "id": "GSD-2005-4811", "modified": "2023-12-13T01:20:09.285716Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:10976", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976" }, { "name": "22292", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22292" }, { "name": "RHSA-2006:0689", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0689.html" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm" }, { "name": "[linux-kernel] 20050805 [PATCH] Fix hugepage crash on failing mmap()", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=112323336017157" }, { "name": "22945", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22945" }, { "name": "DSA-1304", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1304" }, { "name": "25714", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25714" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345" }, { "name": "20362", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20362" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-4811" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345" }, { "name": "RHSA-2006:0689", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2006-0689.html" }, { "name": "20362", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/20362" }, { "name": "22292", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22292" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm", "refsource": "CONFIRM", "tags": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm" }, { "name": "22945", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/22945" }, { "name": "DSA-1304", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2007/dsa-1304" }, { "name": "25714", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/25714" }, { "name": "[linux-kernel] 20050805 [PATCH] Fix hugepage crash on failing mmap()", "refsource": "MLIST", "tags": [], "url": "http://marc.info/?l=linux-kernel\u0026m=112323336017157" }, { "name": "oval:org.mitre.oval:def:10976", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10976" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2017-10-11T01:30Z", "publishedDate": "2005-12-31T05:00Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.