Action not permitted
Modal body text goes here.
cve-2007-5904
Vulnerability from cvelistv5
Published
2007-11-09 18:00
Modified
2024-08-07 15:47
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080208 rPSA-2008-0048-1 kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/487808/100/0/threaded" }, { "name": "SUSE-SA:2008:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html" }, { "name": "26438", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26438" }, { "name": "28643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28643" }, { "name": "oval:org.mitre.oval:def:9901", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901" }, { "name": "USN-618-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "name": "28826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/28826" }, { "name": "SUSE-SA:2008:013", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "name": "29387", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29387" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048" }, { "name": "DSA-1428", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2007/dsa-1428" }, { "name": "27912", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27912" }, { "name": "SUSE-SA:2007:063", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2007_63_kernel.html" }, { "name": "29245", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29245" }, { "name": "RHSA-2008:0167", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0167.html" }, { "name": "SUSE-SA:2007:064", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html" }, { "name": "[linux-kernel] 20071108 Buffer overflow in CIFS VFS.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=119455843205403\u0026w=2" }, { "name": "1019612", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019612" }, { "name": "27666", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27666" }, { "name": "ADV-2007-3860", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3860" }, { "name": "30769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30769" }, { "name": "RHSA-2008:0089", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html" }, { "name": "[linux-kernel] 20071109 Re: Fw: Buffer overflow in CIFS VFS.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=linux-kernel\u0026m=119457447724276\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git%3Ba=commitdiff%3Bh=133672efbc1085f9af990bdc145e1822ea93bcf3" }, { "name": "SUSE-SA:2008:030", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "name": "27888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27888" }, { "name": "29570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29570" }, { "name": "30818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/30818" }, { "name": "kernel-cifsvfs-sendreceive-bo(38450)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38450" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-11-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20080208 rPSA-2008-0048-1 kernel", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/487808/100/0/threaded" }, { "name": "SUSE-SA:2008:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html" }, { "name": "26438", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26438" }, { "name": "28643", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28643" }, { "name": "oval:org.mitre.oval:def:9901", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901" }, { "name": "USN-618-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "name": "28826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/28826" }, { "name": "SUSE-SA:2008:013", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "name": "29387", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29387" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048" }, { "name": "DSA-1428", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2007/dsa-1428" }, { "name": "27912", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27912" }, { "name": "SUSE-SA:2007:063", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2007_63_kernel.html" }, { "name": "29245", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29245" }, { "name": "RHSA-2008:0167", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0167.html" }, { "name": "SUSE-SA:2007:064", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html" }, { "name": "[linux-kernel] 20071108 Buffer overflow in CIFS VFS.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=119455843205403\u0026w=2" }, { "name": "1019612", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019612" }, { "name": "27666", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27666" }, { "name": "ADV-2007-3860", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3860" }, { "name": "30769", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30769" }, { "name": "RHSA-2008:0089", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html" }, { "name": "[linux-kernel] 20071109 Re: Fw: Buffer overflow in CIFS VFS.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=linux-kernel\u0026m=119457447724276\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git%3Ba=commitdiff%3Bh=133672efbc1085f9af990bdc145e1822ea93bcf3" }, { "name": "SUSE-SA:2008:030", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "name": "27888", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27888" }, { "name": "29570", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29570" }, { "name": "30818", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/30818" }, { "name": "kernel-cifsvfs-sendreceive-bo(38450)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38450" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5904", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080208 rPSA-2008-0048-1 kernel", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487808/100/0/threaded" }, { "name": "SUSE-SA:2008:017", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html" }, { "name": "26438", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26438" }, { "name": "28643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28643" }, { "name": "oval:org.mitre.oval:def:9901", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901" }, { "name": "USN-618-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "name": "28826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28826" }, { "name": "SUSE-SA:2008:013", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "name": "29387", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29387" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048" }, { "name": "DSA-1428", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1428" }, { "name": "27912", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27912" }, { "name": "SUSE-SA:2007:063", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_63_kernel.html" }, { "name": "29245", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29245" }, { "name": "RHSA-2008:0167", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0167.html" }, { "name": "SUSE-SA:2007:064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html" }, { "name": "[linux-kernel] 20071108 Buffer overflow in CIFS VFS.", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=119455843205403\u0026w=2" }, { "name": "1019612", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019612" }, { "name": "27666", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27666" }, { "name": "ADV-2007-3860", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3860" }, { "name": "30769", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30769" }, { "name": "RHSA-2008:0089", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html" }, { "name": "[linux-kernel] 20071109 Re: Fw: Buffer overflow in CIFS VFS.", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=119457447724276\u0026w=2" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commitdiff;h=133672efbc1085f9af990bdc145e1822ea93bcf3", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commitdiff;h=133672efbc1085f9af990bdc145e1822ea93bcf3" }, { "name": "SUSE-SA:2008:030", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "name": "27888", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27888" }, { "name": "29570", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29570" }, { "name": "30818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30818" }, { "name": "kernel-cifsvfs-sendreceive-bo(38450)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38450" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5904", "datePublished": "2007-11-09T18:00:00", "dateReserved": "2007-11-09T00:00:00", "dateUpdated": "2024-08-07T15:47:00.529Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2007-5904\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-11-09T18:46:00.000\",\"lastModified\":\"2023-11-07T02:01:24.123\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples desbordamientos de b\u00fafer en el CIFS VFS en el kernel de Linux 2.6.23 y versiones anteriores permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) y, posiblemente, ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de respuestas SMB largas, que disparan un desbordamiento en la funci\u00f3n SendReceive.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:H/Au:N/C:C/I:C/A:C\",\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.2,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.23\",\"matchCriteriaId\":\"6FA8C05E-B944-46CF-9F21-9A5B9FF9A586\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git%3Ba=commitdiff%3Bh=133672efbc1085f9af990bdc145e1822ea93bcf3\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=119455843205403\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=119457447724276\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/27666\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/27888\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/27912\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28643\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/28826\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29245\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29387\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/29570\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30769\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/30818\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1428\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_63_kernel.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0089.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2008-0167.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/487808/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/26438\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1019612\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-618-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/3860\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/38450\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901\",\"source\":\"cve@mitre.org\"}]}}" } }
ghsa-r46j-8frc-xvvq
Vulnerability from github
Published
2022-05-01 18:37
Modified
2022-05-01 18:37
Details
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
{ "affected": [], "aliases": [ "CVE-2007-5904" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2007-11-09T18:46:00Z", "severity": "MODERATE" }, "details": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.", "id": "GHSA-r46j-8frc-xvvq", "modified": "2022-05-01T18:37:37Z", "published": "2022-05-01T18:37:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5904" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38450" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commitdiff;h=133672efbc1085f9af990bdc145e1822ea93bcf3" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=119455843205403\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=linux-kernel\u0026m=119457447724276\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/27666" }, { "type": "WEB", "url": "http://secunia.com/advisories/27888" }, { "type": "WEB", "url": "http://secunia.com/advisories/27912" }, { "type": "WEB", "url": "http://secunia.com/advisories/28643" }, { "type": "WEB", "url": "http://secunia.com/advisories/28826" }, { "type": "WEB", "url": "http://secunia.com/advisories/29245" }, { "type": "WEB", "url": "http://secunia.com/advisories/29387" }, { "type": "WEB", "url": "http://secunia.com/advisories/29570" }, { "type": "WEB", "url": "http://secunia.com/advisories/30769" }, { "type": "WEB", "url": "http://secunia.com/advisories/30818" }, { "type": "WEB", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048" }, { "type": "WEB", "url": "http://www.debian.org/security/2007/dsa-1428" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2007_63_kernel.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2008-0167.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/487808/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/26438" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1019612" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2007/3860" } ], "schema_version": "1.4.0", "severity": [] }
gsd-2007-5904
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2007-5904", "description": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.", "id": "GSD-2007-5904", "references": [ "https://www.suse.com/security/cve/CVE-2007-5904.html", "https://www.debian.org/security/2007/dsa-1428", "https://access.redhat.com/errata/RHSA-2008:0167", "https://access.redhat.com/errata/RHSA-2008:0089", "https://linux.oracle.com/cve/CVE-2007-5904.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2007-5904" ], "details": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.", "id": "GSD-2007-5904", "modified": "2023-12-13T01:21:40.453445Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5904", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080208 rPSA-2008-0048-1 kernel", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/487808/100/0/threaded" }, { "name": "SUSE-SA:2008:017", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html" }, { "name": "26438", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26438" }, { "name": "28643", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28643" }, { "name": "oval:org.mitre.oval:def:9901", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901" }, { "name": "USN-618-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "name": "28826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/28826" }, { "name": "SUSE-SA:2008:013", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "name": "29387", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29387" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048", "refsource": "CONFIRM", "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048" }, { "name": "DSA-1428", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2007/dsa-1428" }, { "name": "27912", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27912" }, { "name": "SUSE-SA:2007:063", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_63_kernel.html" }, { "name": "29245", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29245" }, { "name": "RHSA-2008:0167", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0167.html" }, { "name": "SUSE-SA:2007:064", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html" }, { "name": "[linux-kernel] 20071108 Buffer overflow in CIFS VFS.", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=119455843205403\u0026w=2" }, { "name": "1019612", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019612" }, { "name": "27666", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27666" }, { "name": "ADV-2007-3860", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3860" }, { "name": "30769", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30769" }, { "name": "RHSA-2008:0089", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html" }, { "name": "[linux-kernel] 20071109 Re: Fw: Buffer overflow in CIFS VFS.", "refsource": "MLIST", "url": "http://marc.info/?l=linux-kernel\u0026m=119457447724276\u0026w=2" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commitdiff;h=133672efbc1085f9af990bdc145e1822ea93bcf3", "refsource": "CONFIRM", "url": "http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commitdiff;h=133672efbc1085f9af990bdc145e1822ea93bcf3" }, { "name": "SUSE-SA:2008:030", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "name": "27888", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27888" }, { "name": "29570", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29570" }, { "name": "30818", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/30818" }, { "name": "kernel-cifsvfs-sendreceive-bo(38450)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38450" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.23", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5904" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "[linux-kernel] 20071108 Buffer overflow in CIFS VFS.", "refsource": "MLIST", "tags": [], "url": "http://marc.info/?l=linux-kernel\u0026m=119455843205403\u0026w=2" }, { "name": "[linux-kernel] 20071109 Re: Fw: Buffer overflow in CIFS VFS.", "refsource": "MLIST", "tags": [], "url": "http://marc.info/?l=linux-kernel\u0026m=119457447724276\u0026w=2" }, { "name": "SUSE-SA:2007:063", "refsource": "SUSE", "tags": [], "url": "http://www.novell.com/linux/security/advisories/2007_63_kernel.html" }, { "name": "SUSE-SA:2007:064", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2007-12/msg00001.html" }, { "name": "26438", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/26438" }, { "name": "27666", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/27666" }, { "name": "27888", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/27888" }, { "name": "27912", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/27912" }, { "name": "DSA-1428", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2007/dsa-1428" }, { "name": "RHSA-2008:0089", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0089.html" }, { "name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048", "refsource": "CONFIRM", "tags": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0048" }, { "name": "28826", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28826" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commitdiff;h=133672efbc1085f9af990bdc145e1822ea93bcf3", "refsource": "CONFIRM", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git;a=commitdiff;h=133672efbc1085f9af990bdc145e1822ea93bcf3" }, { "name": "SUSE-SA:2008:013", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00002.html" }, { "name": "28643", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/28643" }, { "name": "29245", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29245" }, { "name": "RHSA-2008:0167", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0167.html" }, { "name": "29387", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29387" }, { "name": "1019612", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1019612" }, { "name": "SUSE-SA:2008:017", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00007.html" }, { "name": "29570", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/29570" }, { "name": "30769", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30769" }, { "name": "USN-618-1", "refsource": "UBUNTU", "tags": [], "url": "http://www.ubuntu.com/usn/usn-618-1" }, { "name": "30818", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/30818" }, { "name": "SUSE-SA:2008:030", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html" }, { "name": "ADV-2007-3860", "refsource": "VUPEN", "tags": [], "url": "http://www.vupen.com/english/advisories/2007/3860" }, { "name": "kernel-cifsvfs-sendreceive-bo(38450)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38450" }, { "name": "oval:org.mitre.oval:def:9901", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9901" }, { "name": "20080208 rPSA-2008-0048-1 kernel", "refsource": "BUGTRAQ", "tags": [], "url": "http://www.securityfocus.com/archive/1/487808/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.2, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-15T21:47Z", "publishedDate": "2007-11-09T18:46Z" } } }
rhsa-2008_0089
Vulnerability from csaf_redhat
Published
2008-01-23 15:07
Modified
2024-11-22 02:11
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and several bugs
in the Red Hat Enterprise Linux 5 kernel are now available.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
These new kernel packages fix the following security issues:
A flaw was found in the virtual filesystem (VFS). An unprivileged local
user could truncate directories to which they had write permission; this
could render the contents of the directory inaccessible. (CVE-2008-0001,
Important)
A flaw was found in the Xen PAL emulation on Intel 64 platforms. A guest
Hardware-assisted virtual machine (HVM) could read the arbitrary physical
memory of the host system, which could make information available to
unauthorized users. (CVE-2007-6416, Important)
A flaw was found in the way core dump files were created. If a local user
can get a root-owned process to dump a core file into a directory, which
the user has write access to, they could gain read access to that core
file, potentially containing sensitive information. (CVE-2007-6206, Moderate)
A buffer overflow flaw was found in the CIFS virtual file system. A
remote,authenticated user could issue a request that could lead to a denial
of service. (CVE-2007-5904, Moderate)
A flaw was found in the "sysfs_readdir" function. A local user could create
a race condition which would cause a denial of service (kernel oops).
(CVE-2007-3104, Moderate)
As well, these updated packages fix the following bugs:
* running the "strace -f" command caused strace to hang, without displaying
information about child processes.
* unmounting an unresponsive, interruptable NFS mount, for example, one
mounted with the "intr" option, may have caused a system crash.
* a bug in the s2io.ko driver prevented VLAN devices from being added.
Attempting to add a device to a VLAN, for example, running the "vconfig
add [device-name] [vlan-id]" command caused vconfig to fail.
* tux used an incorrect open flag bit. This caused problems when building
packages in a chroot environment, such as mock, which is used by the koji
build system.
Red Hat Enterprise Linux 5 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and several bugs\nin the Red Hat Enterprise Linux 5 kernel are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThese new kernel packages fix the following security issues:\n\nA flaw was found in the virtual filesystem (VFS). An unprivileged local\nuser could truncate directories to which they had write permission; this\ncould render the contents of the directory inaccessible. (CVE-2008-0001,\nImportant)\n\nA flaw was found in the Xen PAL emulation on Intel 64 platforms. A guest\nHardware-assisted virtual machine (HVM) could read the arbitrary physical\nmemory of the host system, which could make information available to\nunauthorized users. (CVE-2007-6416, Important)\n\nA flaw was found in the way core dump files were created. If a local user\ncan get a root-owned process to dump a core file into a directory, which\nthe user has write access to, they could gain read access to that core\nfile, potentially containing sensitive information. (CVE-2007-6206, Moderate)\n\nA buffer overflow flaw was found in the CIFS virtual file system. A\nremote,authenticated user could issue a request that could lead to a denial\nof service. (CVE-2007-5904, Moderate)\n\nA flaw was found in the \"sysfs_readdir\" function. A local user could create\na race condition which would cause a denial of service (kernel oops).\n(CVE-2007-3104, Moderate)\n\nAs well, these updated packages fix the following bugs:\n\n* running the \"strace -f\" command caused strace to hang, without displaying\ninformation about child processes.\n\n* unmounting an unresponsive, interruptable NFS mount, for example, one\nmounted with the \"intr\" option, may have caused a system crash.\n\n* a bug in the s2io.ko driver prevented VLAN devices from being added.\nAttempting to add a device to a VLAN, for example, running the \"vconfig\nadd [device-name] [vlan-id]\" command caused vconfig to fail.\n\n* tux used an incorrect open flag bit. This caused problems when building\npackages in a chroot environment, such as mock, which is used by the koji\nbuild system.\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0089", "url": "https://access.redhat.com/errata/RHSA-2008:0089" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "245777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=245777" }, { "category": "external", "summary": "372701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=372701" }, { "category": "external", "summary": "396861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861" }, { "category": "external", "summary": "412091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=412091" }, { "category": "external", "summary": "414041", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=414041" }, { "category": "external", "summary": "424181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=424181" }, { "category": "external", "summary": "425381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425381" }, { "category": "external", "summary": "426289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=426289" }, { "category": "external", "summary": "427994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427994" }, { "category": "external", "summary": "428791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0089.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T02:11:08+00:00", "generator": { "date": "2024-11-22T02:11:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0089", "initial_release_date": "2008-01-23T15:07:00+00:00", "revision_history": [ { "date": "2008-01-23T15:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-01-23T10:07:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T02:11:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-PAE-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-devel-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-debug-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.6.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.6.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-53.1.6.el5.i686", "product_id": "kernel-xen-0:2.6.18-53.1.6.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.6.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.6.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.i386", "product_id": "kernel-headers-0:2.6.18-53.1.6.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.6.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch", "product_id": "kernel-doc-0:2.6.18-53.1.6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-53.1.6.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-53.1.6.el5.src", "product": { "name": "kernel-0:2.6.18-53.1.6.el5.src", "product_id": "kernel-0:2.6.18-53.1.6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-devel-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-debug-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-headers-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64", "product_id": "kernel-xen-0:2.6.18-53.1.6.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-53.1.6.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-53.1.6.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc", "product_id": "kernel-headers-0:2.6.18-53.1.6.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-53.1.6.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-53.1.6.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-53.1.6.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x", "product_id": "kernel-devel-0:2.6.18-53.1.6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-53.1.6.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-53.1.6.el5.s390x", "product": { "name": "kernel-0:2.6.18-53.1.6.el5.s390x", "product_id": "kernel-0:2.6.18-53.1.6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-53.1.6.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-53.1.6.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x", "product_id": "kernel-debug-0:2.6.18-53.1.6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-53.1.6.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x", "product_id": "kernel-headers-0:2.6.18-53.1.6.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-53.1.6.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.6.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.src" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-53.1.6.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-53.1.6.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-3104", "discovery_date": "2007-04-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "427994" } ], "notes": [ { "category": "description", "text": "The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.", "title": "Vulnerability description" }, { "category": "summary", "text": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-3104" }, { "category": "external", "summary": "RHBZ#427994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-3104", "url": "https://www.cve.org/CVERecord?id=CVE-2007-3104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104" } ], "release_date": "2007-06-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-23T15:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0089" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir" }, { "cve": "CVE-2007-5904", "discovery_date": "2007-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "372701" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Buffer overflow in CIFS VFS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5904" }, { "category": "external", "summary": "RHBZ#372701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=372701" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5904", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5904" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5904", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5904" } ], "release_date": "2007-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-23T15:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0089" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Buffer overflow in CIFS VFS" }, { "cve": "CVE-2007-6206", "discovery_date": "2004-07-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "396861" } ], "notes": [ { "category": "description", "text": "The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "Issue with core dump owner", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6206" }, { "category": "external", "summary": "RHBZ#396861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=396861" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6206", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6206" } ], "release_date": "2004-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-23T15:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0089" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Issue with core dump owner" }, { "cve": "CVE-2007-6416", "discovery_date": "2007-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "425381" } ], "notes": [ { "category": "description", "text": "The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.", "title": "Vulnerability description" }, { "category": "summary", "text": "Security: vulnerability of copy_to_user in PAL emulation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-6416" }, { "category": "external", "summary": "RHBZ#425381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=425381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-6416", "url": "https://www.cve.org/CVERecord?id=CVE-2007-6416" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6416", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6416" } ], "release_date": "2007-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-23T15:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0089" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Security: vulnerability of copy_to_user in PAL emulation" }, { "cve": "CVE-2008-0001", "discovery_date": "2008-01-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "428791" } ], "notes": [ { "category": "description", "text": "VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: filesystem corruption by unprivileged user via directory truncation", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0001" }, { "category": "external", "summary": "RHBZ#428791", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428791" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0001" } ], "release_date": "2008-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-01-23T15:07:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188", "product_ids": [ "5Client:kernel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-0:2.6.18-53.1.6.el5.src", "5Client:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Client:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-0:2.6.18-53.1.6.el5.src", "5Server:kernel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-devel-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-doc-0:2.6.18-53.1.6.el5.noarch", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.i386", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.s390x", "5Server:kernel-headers-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-53.1.6.el5.ppc64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-53.1.6.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-53.1.6.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2008:0089" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: filesystem corruption by unprivileged user via directory truncation" } ] }
rhsa-2008_0167
Vulnerability from csaf_redhat
Published
2008-03-14 10:26
Modified
2024-11-22 01:52
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix various security issues and several bugs
are now available for Red Hat Enterprise Linux 4.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
A buffer overflow flaw was found in the CIFS virtual file system. A
remote authenticated user could issue a request that could lead to
a denial of service. (CVE-2007-5904, Moderate)
As well, these updated packages fix the following bugs:
* a bug was found in the Linux kernel audit subsystem. When the audit
daemon was setup to log the execve system call with a large number
of arguments, the kernel could run out out memory while attempting to
create audit log messages. This could cause a kernel panic. In these
updated packages, large audit messages are split into acceptable sizes,
which resolves this issue.
* on certain Intel chipsets, it was not possible to load the acpiphp
module using the "modprobe acpiphp" command. Because the acpiphp module
did not recurse across PCI bridges, hardware detection for PCI hot plug
slots failed. In these updated packages, hardware detection works
correctly.
* on IBM System z architectures that run the IBM z/VM hypervisor, the IBM
eServer zSeries HiperSockets network interface (layer 3) allowed ARP
packets to be sent and received, even when the "NOARP" flag was set. These
ARP packets caused problems for virtual machines.
* it was possible for the iounmap function to sleep while holding a lock.
This may have caused a deadlock for drivers and other code that uses the
iounmap function. In these updated packages, the lock is dropped before
the sleep code is called, which resolves this issue.
Red Hat Enterprise Linux 4 users are advised to upgrade to these updated
packages, which contain backported patches to resolve these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix various security issues and several bugs\nare now available for Red Hat Enterprise Linux 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nA buffer overflow flaw was found in the CIFS virtual file system. A\nremote authenticated user could issue a request that could lead to\na denial of service. (CVE-2007-5904, Moderate)\n\nAs well, these updated packages fix the following bugs:\n\n* a bug was found in the Linux kernel audit subsystem. When the audit\ndaemon was setup to log the execve system call with a large number\nof arguments, the kernel could run out out memory while attempting to\ncreate audit log messages. This could cause a kernel panic. In these\nupdated packages, large audit messages are split into acceptable sizes,\nwhich resolves this issue.\n\n* on certain Intel chipsets, it was not possible to load the acpiphp\nmodule using the \"modprobe acpiphp\" command. Because the acpiphp module\ndid not recurse across PCI bridges, hardware detection for PCI hot plug\nslots failed. In these updated packages, hardware detection works\ncorrectly.\n\n* on IBM System z architectures that run the IBM z/VM hypervisor, the IBM\neServer zSeries HiperSockets network interface (layer 3) allowed ARP\npackets to be sent and received, even when the \"NOARP\" flag was set. These\nARP packets caused problems for virtual machines.\n\n* it was possible for the iounmap function to sleep while holding a lock.\nThis may have caused a deadlock for drivers and other code that uses the\niounmap function. In these updated packages, the lock is dropped before\nthe sleep code is called, which resolves this issue.\n\nRed Hat Enterprise Linux 4 users are advised to upgrade to these updated\npackages, which contain backported patches to resolve these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2008:0167", "url": "https://access.redhat.com/errata/RHSA-2008:0167" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#moderate", "url": "http://www.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "372701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=372701" }, { "category": "external", "summary": "427393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427393" }, { "category": "external", "summary": "428174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=428174" }, { "category": "external", "summary": "430670", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430670" }, { "category": "external", "summary": "433267", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=433267" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2008/rhsa-2008_0167.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T01:52:03+00:00", "generator": { "date": "2024-11-22T01:52:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2008:0167", "initial_release_date": "2008-03-14T10:26:00+00:00", "revision_history": [ { "date": "2008-03-14T10:26:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2008-03-14T06:30:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:52:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.7.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.i686", "product_id": "kernel-devel-0:2.6.9-67.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-67.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-67.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-67.0.7.EL.i686", "product": { "name": "kernel-0:2.6.9-67.0.7.EL.i686", "product_id": "kernel-0:2.6.9-67.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-67.0.7.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.i686", "product_id": "kernel-xenU-0:2.6.9-67.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-67.0.7.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.i686", "product_id": "kernel-smp-0:2.6.9-67.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.7.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.7.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.7.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ia64", "product_id": "kernel-devel-0:2.6.9-67.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-67.0.7.EL.ia64", "product": { "name": "kernel-0:2.6.9-67.0.7.EL.ia64", "product_id": "kernel-0:2.6.9-67.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.7.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.7.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-67.0.7.EL.x86_64", "product": { "name": "kernel-0:2.6.9-67.0.7.EL.x86_64", "product_id": "kernel-0:2.6.9-67.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-67.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-67.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-67.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.7.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-67.0.7.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-67.0.7.EL.src", "product": { "name": "kernel-0:2.6.9-67.0.7.EL.src", "product_id": "kernel-0:2.6.9-67.0.7.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.7.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-67.0.7.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-67.0.7.EL.noarch", "product_id": "kernel-doc-0:2.6.9-67.0.7.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-67.0.7.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-67.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-67.0.7.EL.ppc64", "product": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64", "product_id": "kernel-0:2.6.9-67.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.7.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-67.0.7.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.7.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.7.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.7.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390x", "product_id": "kernel-devel-0:2.6.9-67.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.7.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-67.0.7.EL.s390x", "product": { "name": "kernel-0:2.6.9-67.0.7.EL.s390x", "product_id": "kernel-0:2.6.9-67.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.7.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.7.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390", "product_id": "kernel-devel-0:2.6.9-67.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-67.0.7.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-67.0.7.EL.s390", "product": { "name": "kernel-0:2.6.9-67.0.7.EL.s390", "product_id": "kernel-0:2.6.9-67.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-67.0.7.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-67.0.7.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.7.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-67.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.7.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.7.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-67.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.7.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.7.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-67.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.7.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.7.EL.src" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.7.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.7.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-67.0.7.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-67.0.7.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-67.0.7.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2007-5904", "discovery_date": "2007-11-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "372701" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Buffer overflow in CIFS VFS", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.7.EL.s390", "4AS:kernel-0:2.6.9-67.0.7.EL.s390x", "4AS:kernel-0:2.6.9-67.0.7.EL.src", "4AS:kernel-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.7.EL.src", "4Desktop:kernel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.7.EL.s390", "4ES:kernel-0:2.6.9-67.0.7.EL.s390x", "4ES:kernel-0:2.6.9-67.0.7.EL.src", "4ES:kernel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.7.EL.s390", "4WS:kernel-0:2.6.9-67.0.7.EL.s390x", "4WS:kernel-0:2.6.9-67.0.7.EL.src", "4WS:kernel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5904" }, { "category": "external", "summary": "RHBZ#372701", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=372701" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5904", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5904" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5904", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5904" } ], "release_date": "2007-11-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2008-03-14T10:26:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188\n", "product_ids": [ "4AS:kernel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "4AS:kernel-0:2.6.9-67.0.7.EL.s390", "4AS:kernel-0:2.6.9-67.0.7.EL.s390x", "4AS:kernel-0:2.6.9-67.0.7.EL.src", "4AS:kernel-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.s390", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.s390x", "4AS:kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-doc-0:2.6.9-67.0.7.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-smp-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-67.0.7.EL.s390", "4Desktop:kernel-0:2.6.9-67.0.7.EL.s390x", "4Desktop:kernel-0:2.6.9-67.0.7.EL.src", "4Desktop:kernel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.s390", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-67.0.7.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "4ES:kernel-0:2.6.9-67.0.7.EL.s390", "4ES:kernel-0:2.6.9-67.0.7.EL.s390x", "4ES:kernel-0:2.6.9-67.0.7.EL.src", "4ES:kernel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.s390", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.s390x", "4ES:kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-doc-0:2.6.9-67.0.7.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-smp-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-0:2.6.9-67.0.7.EL.ppc64iseries", "4WS:kernel-0:2.6.9-67.0.7.EL.s390", "4WS:kernel-0:2.6.9-67.0.7.EL.s390x", "4WS:kernel-0:2.6.9-67.0.7.EL.src", "4WS:kernel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.s390", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.s390x", "4WS:kernel-devel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-doc-0:2.6.9-67.0.7.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-largesmp-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-smp-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-smp-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-xenU-0:2.6.9-67.0.7.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-67.0.7.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2008:0167" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Buffer overflow in CIFS VFS" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.